Limit search to available items
Book Cover
E-book
Author Mouheb, Djedjiga, author

Title Aspect-oriented security hardening of UML design models / Djedjiga Mouheb [and 8 more]
Published Cham : Springer, [2015]

Copies

Description 1 online resource (xviii, 237 pages) : illustrations
Contents 880-01 1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion
880-01/(S Machine generated contents note: 1. Introduction -- 1.1. Motivations -- 1.2. Software Security -- 1.3. Model-Driven Engineering -- 1.4. Unified Modeling Language -- 1.5. Aspect-Oriented Paradigm -- 1.6. Outline -- 2. Unified Modeling Language -- 2.1. Why Unified Modeling Language-- 2.2. UML Structure -- 2.3. UML Views and Concepts -- 2.4. UML Diagrams -- 2.5. UML Extension Mechanisms -- 2.5.1. Stereotypes and Tagged Values -- 2.5.2. Constraints -- 2.6. Object-Constraint Language -- 2.7. Executable UML -- 2.7.1. Foundational UML -- 2.7.2. Action Language for Foundational UML -- 2.8. Conclusion -- 3. Aspect-Oriented Paradigm -- 3.1. AOP Models -- 3.1.1. Pointcut-Advice Model -- 3.1.2. Multi-Dimensional Separation of Concerns Model -- 3.1.3. Adaptive Programming Model -- 3.2. AOP and Security -- 3.3. Basic Constructs of the Pointcut-Advice Model -- 3.3.1. Aspects -- 3.3.2. Join Points -- 3.3.3. Pointcuts -- 3.3.4. Advices -- 3.3.5. Introductions -- 3.4. Aspect-Oriented Modeling -- 3.5. Conclusion -- 4. Model-Driven Architecture and Model Transformations -- 4.1. MDA Layers -- 4.1.1. Computation Independent Model (CIM) -- 4.1.2. Platform Independent Model (PIM) -- 4.1.3. Platform Specific Model (PSM) -- 4.1.4. Implementation Specific Model (ISM) -- 4.2. MDA Benefits -- 4.3. MDA Transformations -- 4.4. Applications of Model Transformations -- 4.5. Model Transformation Languages and Tools -- 4.5.1. Query/View/Transformation Language -- 4.5.2. Atlas Transformation Language -- 4.5.3. Open Architecture Ware -- 4.5.4. IBM Model Transformation Framework -- 4.5.5. Kermeta -- 4.6. Comparative Study of Model Transformation Languages -- 4.7. Conclusion -- 5. Model-Based Security -- 5.1. Security Specification for UML Design -- 5.1.1. Security Specification Using UML Artifacts -- 5.1.2. Security Specification by Extending UML Meta-language -- 5.1.3. Security Specification by Creating New Meta-languages -- 5.2. Usability Discussion -- 5.2.1. Usability Criteria -- 5.2.2. Security Specification Using UML Artifacts -- 5.2.3. Extending UML Meta-language -- 5.2.4. Creating a New Meta-language -- 5.3. Model-Based Security Hardening Mechanisms -- 5.3.1. Security Design Patterns -- 5.3.2. Mechanism-Directed Meta-languages -- 5.3.3. Aspect-Oriented Modeling -- 5.3.4. Challenges -- 5.4. Related Work on Model-Based Security -- 5.4.1. Security Design Patterns -- 5.4.2. Mechanism-Directed Meta-languages -- 5.4.3. Aspect-Oriented Modeling -- 5.4.4. Comparative Study -- 5.5. Conclusion -- 6. Security Aspect Specification -- 6.1. Proposed AOM Approach for Security Hardening -- 6.2. UML Profile for Aspect-Oriented Modeling -- 6.2.1. Aspect Adaptations -- 6.2.2. Aspect Adaptation Rules -- 6.2.3. Pointcuts -- 6.3. Related Work on AOM -- 6.4. Conclusion -- 7. Security Aspect Weaving -- 7.1. Approach Overview -- 7.2. Security Aspect Specialization -- 7.3. Join Point Matching -- 7.4. Security Aspect Weaving -- 7.4.1. Weaver Architecture -- 7.4.2. Transformation Definitions -- 7.4.3. Transformation Rules -- 7.5. Tool Support -- 7.5.1. AOM Profile -- 7.5.2. Weaving Framework -- 7.6. Case Studies -- 7.6.1. Service Provider Application -- 7.6.2. SIP-Communicator -- 7.6.3. Replacing Deprecated Functions in OpenSAF -- 7.7. Related Work on Model Weaving -- 7.8. Conclusion -- 8. Static Matching and Weaving Semantics in Activity Diagrams -- 8.1. Syntax -- 8.1.1. Activity Diagrams Syntax -- 8.1.2. Aspect Syntax -- 8.2. Matching and Weaving Semantics -- 8.2.1. Matching Semantics -- 8.2.2. Weaving Semantics -- 8.3. Completeness and Correctness of the Weaving -- 8.3.1. Algorithms -- 8.3.2. Completeness and Correctness -- 8.4. Conclusion -- 9. Dynamic Matching and Weaving Semantics in A-Calculus -- 9.1. Background -- 9.1.1. λ-Calculus -- 9.1.2. Denotational Semantics -- 9.1.3. Continuation-Passing Style -- 9.1.4. Defunctionalization -- 9.2. Syntax and Denotational Semantics -- 9.3. Continuation-Passing Style Semantics -- 9.3.1. Representation of Continuations as Functions -- 9.3.2. Representation of Continuations as Frames -- 9.4. Aspect Syntax and Semantics -- 9.4.1. Aspect Syntax -- 9.4.2. Matching Semantics -- 9.4.3. Weaving Semantics -- 9.5. Semantics of Flow-Based Pointcuts -- 9.5.1. Control Flow Pointcut -- 9.5.2. Dataflow Pointcut -- 9.5.3. Example -- 9.6. Related Work on AOP Semantics -- 9.7. Conclusion -- 10. Dynamic Matching and Weaving Semantics in Executable UML -- 10.1. Example -- 10.2. Syntax -- 10.3. Denotational Semantics -- 10.3.1. Denotational Semantics of Activity Diagrams -- 10.3.2. Denotational Semantics of Alf Language -- 10.4. Continuation-Passing Style Semantics -- 10.4.1. Representation of Continuations as Functions -- 10.4.2. Representation of Continuations as Frames -- 10.5. Aspect Syntax and Semantics -- 10.5.1. Aspect Syntax -- 10.5.2. Matching Semantics -- 10.5.3. Weaving Semantics -- 10.6. Semantics of the Dataflow Pointcut -- 10.7. Related Work on Aspect Semantics in xUML -- 10.8. Conclusion -- 11. Conclusion
Summary This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (SpringerLink, viewed May 1, 2015)
In Springer eBooks
Subject UML (Computer science)
Aspect-oriented programming.
Computer security
Computer Security
COMPUTERS -- Programming Languages -- UML.
Aspect-oriented programming
Computer security
UML (Computer science)
Form Electronic book
ISBN 9783319161068
3319161067
3319161059
9783319161051