LEADER 05014nam 22006735 450 001 9910299245503321 005 20200704105204.0 010 $a3-319-16106-7 024 7 $a10.1007/978-3-319-16106-8 035 $a(CKB)3710000000402809 035 $a(EBL)2094488 035 $a(SSID)ssj0001500969 035 $a(PQKBManifestationID)11771811 035 $a(PQKBTitleCode)TC0001500969 035 $a(PQKBWorkID)11523360 035 $a(PQKB)10467001 035 $a(DE-He213)978-3-319-16106-8 035 $a(MiAaPQ)EBC2094488 035 $a(PPN)18548574X 035 $a(EXLCZ)993710000000402809 100 $a20150410d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAspect-Oriented Security Hardening of UML Design Models /$fby Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (247 p.) 300 $aDescription based upon print version of record. 311 $a3-319-16105-9 320 $aIncludes bibliographical references and index. 327 $a1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion. 330 $aThis book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering. 606 $aSoftware engineering 606 $aComputer security 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aSoftware engineering. 615 0$aComputer security. 615 14$aSoftware Engineering. 615 24$aSystems and Data Security. 676 $a004 676 $a005.1 676 $a005.8 700 $aMouheb$b Djedjiga$4aut$4http://id.loc.gov/vocabulary/relators/aut$0871784 702 $aDebbabi$b Mourad$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aPourzandi$b Makan$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWang$b Lingyu$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aNouh$b Mariam$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aZiarati$b Raha$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aAlhadidi$b Dima$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTalhi$b Chamseddine$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aLima$b Vitor$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910299245503321 996 $aAspect-Oriented Security Hardening of UML Design Models$92517190 997 $aUNINA