Encapsulating Rules of Prudent Security Engineering

  • Authors:
  • Jan Jürjens

  • Affiliations:
  • -

  • Venue:
  • Revised Papers from the 9th International Workshop on Security Protocols
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

In practice, security of computer systems is compromised most often not by breaking dedicated mechanisms (such as security protocols), but by exploiting vulnerabilities in the way they are employed. Towards a solution of this problem we aim to encapsulate rules of prudent security engineering in sucha way that a system specification formulated in (a formal core of) the Unified Modeling Language (UML, the industrystandard in object-oriented modelling) can be evaluated wrt. these rules, violations be indicated and suggestions for modifications be derived.