We present a method for software development in which information flow se-curity is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the system architecture and selects a set of security requirements (in the form of secure information flow properties) that the system must adhere to. The user then specifies each component of the system architecture using UML inspired state machines, and refines/transforms these (abstract) state machines into concrete state machines. It is shown that if the abstract specification adheres to the security requirements, then so does the concrete one provided that certain conditions are satisfied.
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We explain UMLsec and associated techniques to incorporate security aspects in model-based developme...
Security is a major issue in developing software systems. It is widely recognized that security aspe...
Currently security features are implemented and validated during the last phases of the software dev...
Current IT systems consist usually of several components and services that communicate and exchange ...
We present a way to support the development of software applications that takes into account confide...
AbstractSecurity specifications are controls and constraints on the behavior of the software and can...
We present a framework that supports an incremental and modular de-velopment process of secure softw...
This paper proposes a framework for information flow security in component-based systems which follo...
AbstractSecurity specifications are controls and constraints on the behavior of the software and can...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
This report presents an approach called IFlow which allows the model-driven development of secure sy...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We explain UMLsec and associated techniques to incorporate security aspects in model-based developme...
Security is a major issue in developing software systems. It is widely recognized that security aspe...
Currently security features are implemented and validated during the last phases of the software dev...
Current IT systems consist usually of several components and services that communicate and exchange ...
We present a way to support the development of software applications that takes into account confide...
AbstractSecurity specifications are controls and constraints on the behavior of the software and can...
We present a framework that supports an incremental and modular de-velopment process of secure softw...
This paper proposes a framework for information flow security in component-based systems which follo...
AbstractSecurity specifications are controls and constraints on the behavior of the software and can...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
This report presents an approach called IFlow which allows the model-driven development of secure sy...
The unified modeling language (UML) has gained wide acceptance for the design of component-based app...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
We propose a method to check secure information flow in concurrent programs with synchronization. T...
We explain UMLsec and associated techniques to incorporate security aspects in model-based developme...
Security is a major issue in developing software systems. It is widely recognized that security aspe...