Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Computer Security in the Real World
Computer
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Securing Java RMI-Based Distributed Applications
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
Weaving security aspects into UML 2.0 design models
Proceedings of the 13th workshop on Aspect-oriented modeling
An aspect-oriented methodology for designing secure applications
Information and Software Technology
Tool support for the rapid composition, analysis and implementation of reactive services
Journal of Systems and Software
Automated Encapsulation of UML Activities for Incremental Development and Verification
MODELS '09 Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems
Compositionality of Security Protocols: A Research Agenda
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure Systems Development with UML
Secure Systems Development with UML
Aligning UML 2.0 state machines and temporal logic for the efficient execution of services
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
Reactive semantics for distributed UML activities
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
Proceedings of the 10th ACM international conference on Generative programming and component engineering
Security asset elicitation for collaborative models
Proceedings of the Workshop on Model-Driven Security
Compositional verification of application-level security properties
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Hi-index | 0.00 |
We describe a highly automated and tool-supported method for the correct integration of security mechanisms into distributed applications. Security functions to establish and release secure connections are provided as self-contained, collaborative building blocks specifying the behavior of several parties. For the security mechanisms to be effective, the application-specific model needs to fulfill certain behavioral properties, for instance, a consistent start and termination. We identify these properties and show how they lead to correct secured applications.