Building a secure computer system
Building a secure computer system
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
On agent-based software engineering
Artificial Intelligence
Model Driven Architecture: Applying MDA to Enterprise Computing
Model Driven Architecture: Applying MDA to Enterprise Computing
Petri Nets for System Engineering: A Guide to Modeling, Verification, and Applications
Petri Nets for System Engineering: A Guide to Modeling, Verification, and Applications
Pattern-Based Software Architecture: A Case Study
ITCC '03 Proceedings of the International Conference on Information Technology: Computers and Communications
Model Checking Early Requirements Specifications in Tropos
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
DEXA '07 Proceedings of the 18th International Conference on Database and Expert Systems Applications
A Security Engineering Process based on Patterns
DEXA '07 Proceedings of the 18th International Conference on Database and Expert Systems Applications
A proposal for structuring Petri net-based agent interaction protocols
ICATPN'03 Proceedings of the 24th international conference on Applications and theory of Petri nets
Secure Systems Development with UML
Secure Systems Development with UML
Process definition and project tracking in model driven engineering
PROFES'06 Proceedings of the 7th international conference on Product-Focused Software Process Improvement
Companion of the 30th international conference on Software engineering
Hi-index | 0.00 |
Security Patterns - the adaption of Design Patterns by Gamma et al. to security - have not quite met the expectations since Yoder and Barcalow pioneered the field. The two main reasons for this are the lack of formalisation and the fact that security often permeates all parts of a software, which is hard to encapsulate in a single pattern. This paper investigates and presents our method of using Petri nets to first model security patterns on an abstract level. Gradual and intuitive refinement of the Petri nets then permits the creation of a running Petri net implementation - very much in the sense of model driven software engineering (MDSE) and model driven security (MDS). The Petri nets are modelled and executed using Renew - both IDE and virtual machine.