Blog
About

154
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Tools for Traceable Security Verification

      , ,

      Visions of Computer Science - BCS International Academic Conference (VOCS)

      BCS International Academic Conference

      22 - 24 September 2008

      Software engineering, Security analysis, Dependable systems evolution

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work towards addressing this challenge which focusses on one facet of dependability, namely data security: We give an overview on an approach for modelbased security verification which provides a traceability link to the implementation. The approach uses a design model in the UML security extension UMLsec which can be formally verified against high-level security requirements such as secrecy and authenticity. An implementation of the specification can then be verified against the model by making use of run-time verification through the traceability link. The approach supports software evolution in so far as the traceability mapping is updated when refactoring operations are regressively performed using our tool-supported refactoring technique. The proposed method has been applied to an implementation of the Internet security protocol SSL.

          Related collections

          Most cited references 5

          • Record: found
          • Abstract: not found
          • Article: not found

          A survey of software refactoring

           T. Mens,  T. Tourwe (2004)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Enforceable security policies

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Applying Game Semantics to Compositional Software Modeling and Verification

                Bookmark

                Author and article information

                Conference
                September 2008
                September 2008
                : 367-378
                Affiliations
                Computing Department, The Open University, UK

                http://mcs.open.ac.uk/{jj2924,yy66}
                Computer Sciences Lab, Australian National University

                http://users.rsise.anu.edu.au/~baueran
                Article
                10.14236/ewic/VOCS2008.31
                © Jan Jürjens et al. Published by BCS Learning and Development Ltd. Visions of Computer Science - BCS International Academic Conference

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Visions of Computer Science - BCS International Academic Conference
                VOCS
                Imperial College, London, UK
                22 - 24 September 2008
                Electronic Workshops in Computing (eWiC)
                BCS International Academic Conference
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article