Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
IEEE Security and Privacy
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Patterns for Fault Tolerant Software
Patterns for Fault Tolerant Software
A dependability profile within MARTE
Software and Systems Modeling (SoSyM)
Towards a better integration of patterns in secure component-based systems design
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Design Patterns for Rule-Based Refinement of Safety Critical Embedded Systems Models
ICECCS '12 Proceedings of the 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems
Hi-index | 0.00 |
In critical systems, failures or attacks based on software misconceptions can have catastrophic consequences. In order to avoid those situations, such systems need security and dependability (S&D) constraints. Usually S&D design patterns shape S&D mechanisms. Security and dependability experts identify S&D mechanisms to reach S&D objectives and manually apply them to the system architecture. Our contribution consists in studying S&D design patterns application. We formalize these S&D design patterns as model transformations, preconditions and postconditions to automate their integration. Finally, we illustrate this process with a Software Defined Radio case study to which we apply the red/black (R/B) architecture security design pattern.