Costing secure software development: A systematic mapping study
Building more secure software is a recent concern for software engineers due to increasing
incidences of data breaches and other types of cyber attacks. However, software security …
incidences of data breaches and other types of cyber attacks. However, software security …
UML2Alloy: A challenging model transformation
Alloy is a formal language, which has been applied to modelling of systems in a wide range
of application domains. It is supported by Alloy Analyzer, a tool, which allows fully automated …
of application domains. It is supported by Alloy Analyzer, a tool, which allows fully automated …
Security modelling and formal verification of survivability properties: Application to cyber–physical systems
The modelling and verification of systems security is an open research topic whose
complexity and importance needs, in our view, the use of formal and non-formal methods …
complexity and importance needs, in our view, the use of formal and non-formal methods …
Engineering security into distributed systems: A survey of methodologies
A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …
software distribution as a central computing paradigm. This has been accompanied by a …
Translating between Alloy specifications and UML class diagrams annotated with OCL
Abstract Model-driven engineering (MDE) is a software engineering approach based on
model transformations at different abstraction levels. It prescribes the development of …
model transformations at different abstraction levels. It prescribes the development of …
Architectural patterns for secure IoT orchestrations
K Fysarakis, G Spanoudakis… - 2019 Global IoT …, 2019 - ieeexplore.ieee.org
The vast amount of connected devices on the Internet of Things (IoT) creates an enormous
potential for new applications, by leveraging synergies arising through the convergence of …
potential for new applications, by leveraging synergies arising through the convergence of …
Modelling security of critical infrastructures: a survivability assessment
Critical infrastructures, usually designed to handle disruptions caused by human errors or
random acts of nature, define assets whose normal operation must be guaranteed to …
random acts of nature, define assets whose normal operation must be guaranteed to …
Specification, verification, and quantification of security in model-based systems
Modern systems are more and more complex and security has become a key component in
the success of software and systems development. The main challenge encountered in …
the success of software and systems development. The main challenge encountered in …
BeAFix: an automated repair tool for faulty alloy models
This paper describes BeAFix, a tool for automated repair of faulty Alloy models. The tool
builds upon the Alloy Analyzer, the analysis tool for Alloy. It generates repair candidates by …
builds upon the Alloy Analyzer, the analysis tool for Alloy. It generates repair candidates by …
A model-driven approach for vulnerability evaluation of modern physical protection systems
Modern physical protection systems integrate a number of security systems (including
procedures, equipments, and personnel) into a single interface to ensure an adequate level …
procedures, equipments, and personnel) into a single interface to ensure an adequate level …