Costing secure software development: A systematic mapping study

E Venson, X Guo, Z Yan, B Boehm - Proceedings of the 14th …, 2019 - dl.acm.org
Building more secure software is a recent concern for software engineers due to increasing
incidences of data breaches and other types of cyber attacks. However, software security …

UML2Alloy: A challenging model transformation

K Anastasakis, B Bordbar, G Georg, I Ray - Model Driven Engineering …, 2007 - Springer
Alloy is a formal language, which has been applied to modelling of systems in a wide range
of application domains. It is supported by Alloy Analyzer, a tool, which allows fully automated …

Security modelling and formal verification of survivability properties: Application to cyber–physical systems

S Bernardi, U Gentile, S Marrone, J Merseguer… - Journal of Systems and …, 2021 - Elsevier
The modelling and verification of systems security is an open research topic whose
complexity and importance needs, in our view, the use of formal and non-formal methods …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

Translating between Alloy specifications and UML class diagrams annotated with OCL

A Cunha, A Garis, D Riesco - Software & Systems Modeling, 2015 - Springer
Abstract Model-driven engineering (MDE) is a software engineering approach based on
model transformations at different abstraction levels. It prescribes the development of …

Architectural patterns for secure IoT orchestrations

K Fysarakis, G Spanoudakis… - 2019 Global IoT …, 2019 - ieeexplore.ieee.org
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous
potential for new applications, by leveraging synergies arising through the convergence of …

Modelling security of critical infrastructures: a survivability assessment

RJ Rodríguez, J Merseguer, S Bernardi - The Computer Journal, 2015 - academic.oup.com
Critical infrastructures, usually designed to handle disruptions caused by human errors or
random acts of nature, define assets whose normal operation must be guaranteed to …

Specification, verification, and quantification of security in model-based systems

S Ouchani, M Debbabi - Computing, 2015 - Springer
Modern systems are more and more complex and security has become a key component in
the success of software and systems development. The main challenge encountered in …

BeAFix: an automated repair tool for faulty alloy models

SG Brida, G Regis, G Zheng, H Bagheri… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
This paper describes BeAFix, a tool for automated repair of faulty Alloy models. The tool
builds upon the Alloy Analyzer, the analysis tool for Alloy. It generates repair candidates by …

A model-driven approach for vulnerability evaluation of modern physical protection systems

A Drago, S Marrone, N Mazzocca, R Nardone… - Software & Systems …, 2019 - Springer
Modern physical protection systems integrate a number of security systems (including
procedures, equipments, and personnel) into a single interface to ensure an adequate level …