Advertisement

Model-based Security Engineering with UML

Chapter
  • 745 Downloads

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4.4 Notes

  1. [HJ03b]
    S.H. Houmb and J. Jürjens. Developing secure networked web-based systems using model-based risk assessment and UMLsec. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), page 488ff. IEEE Computer Society, New York, 2003.Google Scholar
  2. [JG03]
    J. Jürjens and J. Grünbauer. Critical systems development with UML: Overview with automotive case-study. In 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), pages 512–517. International Association for Computer and Information Science (ACIS), 2003.Google Scholar
  3. [JH04]
    J. Jürjens and S.K. Houmb. Risk-driven development of security-critical systems using UMLsec. Kluwer Academic, Dordrecht, 2004. Book chapter to be published (book title pending).Google Scholar
  4. [JPW02]
    J. Jürjens, G. Popp, and G. Wimmel. Towards using security patterns in model-based system development. In 1th European Conference on Pattern Languages of Programs (EuroPLoP 2002), 2002. Security Focus Group.Google Scholar
  5. [Jür01c]
    J. Jürjens. Developing secure systems with UMLsec — from business processes to implementation. In D. Fox, M. Köhntopp, and A. Pfitzmann, editors, Verläßliche IT-Systeme 2001 (VIS 2001), DuD-Fachbeiträge. Vieweg, Wiesbaden, 2001.Google Scholar
  6. [Jür01d]
    J. Jürjens. Formal development and verification of security-critical systems with UML. In Workshop on Automated Verification of Critical Systems (AVoCS 2001), Oxford, 2001. Published as OUCL Technical Report PRG-RR-01-07. Available at ftp://ftp.comlab.ox.ac.uk/pub/Documents/techreports/RR-01-07.ps.gz.Google Scholar
  7. [Jür01e]
    J. Jürjens. Modelling audit security for smart-card payment schemes with UMLsec. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, pages 93–108. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2001. Proceedings of the 16th International Conference on Information Security (SEC 2001).Google Scholar
  8. [Jür0lh]
    J. Jürjens. Secure Java development with UMLsec. In B. De Decker, F. Piessens, J. Smits, and E. Van Herrenweghen, editors, Advances in Network and Distributed Systems Security, pages 107–124. International Federation for Information Processing (IFIP) TC-11 WG 11.4, Kluwer Academic, Dordrecht, 2001. Proceedings of the First Annual Working Conference on Network Security (I-NetSec 2001).Google Scholar
  9. [Jür0lj]
    J. Jürjens. Transformations for introducing patterns — a secure systems case study. In Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event), 2001.Google Scholar
  10. [Jür02d]
    J. Jürjens. Formal semantics for interacting UML subsystems. In B. Jacobs and A. Rensink, editors, 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), pages 29–44. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2002.Google Scholar
  11. [Jür02c]
    J. Jürjens. Encapsulating rules of prudent security engineering. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols, volume 2467 of Lecture Notes in Computer Science, pages 95–101. Springer, Berlin Heidelberg New York, 2002. 9th International Workshop. Transcript of discussion on pages 102–106.Google Scholar
  12. [Jür02e]
    J. Jürjens. Methodische Entwicklung sicherer CORBA-Anwendungen. In P. Horster, editor, Enterprise Security. IT-Verlag, Sauerlach, 2002.Google Scholar
  13. [Jür02g]
    J. Jürjens. Secure systems development with UML — applications to telemedicine. In CORAS Public Workshop, 2002. International Conference on Telemedicine (ICT 2002). Invited talk.Google Scholar
  14. [Jür02i]
    J. Jürjens. UMLsec: Extending UML for secure systems development. In H. Hußmann, and S. Cook, editors. 5th International Conference on the Unified Modeling Language (UML 2002), volume 2460 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York, 2002. Jézéquel et al [JHC02], pages 412–425.Google Scholar
  15. [Jür02j]
    J. Jürjens. Using UMLsec and goal-trees for secure systems development. In H. Haddad, G. Papadopoulos, and B. Panda, editors. Proceedings of the 2002 Symposium of Applied Computing (SAC). ACM Press, 2002. Lamont et al [LHPP02], pages 1026–1031.Google Scholar
  16. [Jür03c]
    J. Jürjens. Developing safety-and security-critical systems with UML. In DARP workshop, 2003. Invited talk.Google Scholar
  17. [Jür03g]
    J. Jürjens. Model-based security with UMLsec. In UML Forum Tokyo, 2003. Invited talk.Google Scholar
  18. [Jür04c]
    J. Jürjens. Developing high-assurance secure systems with UML: An electronic purchase protocol. In Eighth IEEE International Symposium on High Assurance Systems Engineering (RASE 2004), pages 231–240. IEEE Computer Society, New York, 2004.Google Scholar
  19. [Jür04d]
    J. Jürjens. Developing security-critical applications with UMLsec — a short walk-through. Novatica, 168, March/April 2004.Google Scholar
  20. [Jür04e]
    J. Jürjens. Developing Security-Critical Systems with UML, 2004. Series of tutorials at 30 international conferences including OMG DOCsec 2002, IFIP SEC 2002, ETAPS 2003, OMG Workshop On UML for Enterprise Applications 2003, Formal Methods Symposium 2003, ASE 2003, FMOODS 2003, ECOOP 2004, and WCC 2004. Download of material at http://www4.in.tum.de/~juerjens/csdumltut.Google Scholar
  21. [Jür04f]
    J. Jürjens. Foundations for designing secure architectures. In First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, 2004.Google Scholar
  22. [Jür04g]
    J. Jürjens. Logic for security. In Spring School “Logic in Computer Science”, Venezia, 2004. Graduate school on Logic in Informatics, Munich.Google Scholar
  23. [Jür04i]
    J. Jürjens. Security in UML. In4th International School on Foundations of Security Analysis and Design (FOSAD 2004), 2004.Google Scholar
  24. [Jür05]
    J. Jürjens. Security modeling with UML. Universidad Carlos III de Madrid, 2005.Google Scholar
  25. [PJWB03]
    G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), pages 478–487. IEEE Computer Society, New York, 2003.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Personalised recommendations