EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Computer Standards & Interfaces
Computer Standards & Interfaces
Journal of Systems and Software
Reusable security use cases for mobile grid environments
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
A systematic review of security requirements engineering
Computer Standards & Interfaces
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Applying a security requirements engineering process
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
An advanced approach for modeling and detecting software vulnerabilities
Information and Software Technology
Software and Systems Modeling (SoSyM)
Hi-index | 0.00 |
Due to increasing interconnection, IT systems are confrontedwith more and more attacks. To address this problem,we have to consider security requirements from the beginningof the system development. In early phases of systemdevelopment, it is common to use a hybrid system viewwhich is based on an object oriented modeling of the applicationcore and the specification of use cases. In thispaper, we present an extension of this process for security-criticalsystems. We show a methodical approach for thedevelopment of security-critical systems and the modelingof security aspects in the application core with an extensionof the Unified Modeling Language for secure systems development,UMLsec. Furthermore, we introduce security usecases for the development of security aspects in conjunctionwith behavioral modeling.