Security in computing
A formal security design approach for information exchange in organisations
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
The object constraint language: precise modeling with UML
The object constraint language: precise modeling with UML
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Aspect-oriented programming with adaptive methods
Communications of the ACM
Using multidimensional separation of concerns to (re)shape evolving software
Communications of the ACM
Composing crosscutting concerns using composition filters
Communications of the ACM
Communications of the ACM
Analyzing the role of aspects in software design
Communications of the ACM
Handling crosscutting constraints in domain-specific modeling
Communications of the ACM
Aspect-oriented programming using reflection and metaobject protocols
Communications of the ACM
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Coordination Technologies for Managing Information System Evolution
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Role-Based Authorization Constraints Specification Using Object Constraint Language
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
A Role-Based Secure Database Design Tool
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Using Aspects to Design a Secure System
ICECCS '02 Proceedings of the Eighth International Conference on Engineering of Complex Computer Systems
A method for designing secure solutions
IBM Systems Journal - End-to-end security
Security policy conceptual modeling and formalization for networked information systems
Computer Communications
A middleware-transparent approach to developing distributed applications: Research Articles
Software—Practice & Experience
Information and Software Technology
Directives for composing aspect-oriented design class models
Transactions on Aspect-Oriented Software Development I
Hi-index | 0.01 |
In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms required for high integrity systems. To support this activity we have developed an initial tabulation of different kinds of threats and the mechanisms used to prevent, detect, and recover from the related attacks and problems. Each mechanism can be modeled independently as an aspect. After the mechanisms are identified, the corresponding aspects are then woven in the appropriate order into the models of the essential system functionality to produce a model of a high integrity system.