ACM Transactions on Computer Systems (TOCS)
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Real-Time UML: Developing Efficient Objects for Embedded Systems
Real-Time UML: Developing Efficient Objects for Embedded Systems
Design pattern modelling and instantiation using DPML
CRPIT '02 Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Authenticity and Provability - A Formal Framework
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Proving Properties of Security Protocols by Induction
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Design of self-managing dependable systems with UML and fault tolerance patterns
WOSS '04 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
LePUS3: An Object-Oriented Design Description Language
Diagrams '08 Proceedings of the 5th international conference on Diagrammatic Representation and Inference
Designing Fault-Tolerant Component Based Applications with a Model Driven Approach
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Towards Precise Security Patterns
DEXA '08 Proceedings of the 2008 19th International Conference on Database and Expert Systems Application
On a formal framework for security properties
Computer Standards & Interfaces
Precise modeling of design patterns
UML'00 Proceedings of the 3rd international conference on The unified modeling language: advancing the standard
Abstractions preserving parameter confidentiality
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Security evaluation of scenarios based on the TCG's TPM specification
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Safety lifecycle development process modeling for embedded systems - example of railway domain
SERENE'12 Proceedings of the 4th international conference on Software Engineering for Resilient Systems
Towards tool support for pattern-based secure and dependable systems development
Proceedings of the workshop on ACadeMics Tooling with Eclipse
Hi-index | 0.00 |
The requirement for higher security and dependability of systems is continuously increasing even in domains not traditionally deeply involved in such issues. Yet, evolution of embedded systems towards devices connected via Internet, wireless communication or other interfaces requires a reconsideration of secure and trusted embedded systems engineering processes. In this paper, we propose an approach that associates model driven engineering (MDE) and formal validation to build security and dependability (S&D) patterns for trusted RCES applications. The contribution of this work is twofold. On the one hand, we use model-based techniques to capture a set of artifacts to encode S&D patterns. On the other hand, we introduce a set of artifacts for the formal validation of these patterns in order to guarantee their correctness. The formal validation in turn follows the the MDE process and thus links concrete validation results to the S&D requirements identified at higher levels of abstraction.