We present a way to support the development of software applications that takes into account confidentiality issues, and how the developed code can be automatically verified. We use the Unified Modelling Language (UML) together with annotations to permit confidentiality to be considered during the whole development process from requirements to code. We have provided support for software development using UML diagrams so that the code produced can be be validated by a language-based checker, in our case Jif (Java information flow). We demonstrate that the combination of model-based and language-based security is compelling
Modeling of security and access control policies, along with their implementation in code, must be a...
We present a way of incorporating a decentralized labelmodel into the UML by defining a profile whic...
The development of secure software is a daunting task requiring that security is tackled throughout ...
Recently, many research studies have suggested the integration of safety engineering at an early sta...
Security is an integral part of most software systems but it is not considered as an explicit part i...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
To guarantee the security of computer systems, it is necessary to define security permissions to res...
We present a modeling language for the model-driven development of secure, distributed systems base...
We present tools to support model-based security engineering on both the model and the code level. I...
Security is an integral part of most software systems but it is not considered as an explicit part i...
We present a method for software development in which information flow se-curity is taken into consi...
The current state of the art in developing security-critical software and systems in practice is far...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
Modeling of security and access control policies, along with their implementation in code, must be a...
We present a way of incorporating a decentralized labelmodel into the UML by defining a profile whic...
The development of secure software is a daunting task requiring that security is tackled throughout ...
Recently, many research studies have suggested the integration of safety engineering at an early sta...
Security is an integral part of most software systems but it is not considered as an explicit part i...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Software security is becoming increasingly invasive in all aspects of a software application but the...
To guarantee the security of computer systems, it is necessary to define security permissions to res...
We present a modeling language for the model-driven development of secure, distributed systems base...
We present tools to support model-based security engineering on both the model and the code level. I...
Security is an integral part of most software systems but it is not considered as an explicit part i...
We present a method for software development in which information flow se-curity is taken into consi...
The current state of the art in developing security-critical software and systems in practice is far...
Contains fulltext : 29857.pdf (publisher's version ) (Open Access)Programs contain...
Modeling of security and access control policies, along with their implementation in code, must be a...
We present a way of incorporating a decentralized labelmodel into the UML by defining a profile whic...
The development of secure software is a daunting task requiring that security is tackled throughout ...