skip to main content
10.1145/2422498acmconferencesBook PagePublication PagesmodelsConference Proceedingsconference-collections
MDsec '12: Proceedings of the Workshop on Model-Driven Security
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MODELS '12: ACM/IEEE 15th International Conference on Model Driven Engineering Languages and Systems Innsbruck Austria October 1 - 5, 2012
ISBN:
978-1-4503-1806-8
Published:
01 October 2012
Sponsors:
SIGSOFT, IEEE CS

Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
research-article
Model-driven security: MDsec '12 Workshop at MoDELS 2012, Innsbruck, Austria

We have seen many efforts invested in research on engineering security aspects of software and systems over the last years, but we have also seen spectacular security breaches and privacy leaks in web applications, mobile apps, and enterprise systems. ...

research-article
Architecting a security strategy measurement and management system

The use of formal models to guide security design is appealing. This paper presents a model driven approach whereby security systems in operation can be assessed and measured against various requirements that are defined when the system is created. By ...

research-article
Model-driven architectural risk analysis using architectural and contextualised attack patterns

A secure system architecture is often based on a variety of design and security model elements. Without some way of evaluating the impact of these individual design elements in the face of possible attacks, design flaws may weaken a software ...

research-article
Towards model-driven development of access control policies for web applications

We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and intuitive way and a model-driven process that transforms graphical specifications of access control policies in XACML. These XACML policies are then ...

research-article
A model-driven approach for the extraction of network access-control policies

Network security constitutes a critical concern when developing and maintaining nowadays corporate information systems. Firewalls are a key element of network security by filtering the traffic of the network in compliance with a number of access control ...

research-article
Toward a model-driven access-control enforcement mechanism for pervasive systems

Pervasive systems typically involve heterogeneous users, devices and networks to provide services seamlessly interacting with the physical world. In order to be flexible, these systems must be both dynamically adaptive to handle and still open to the ...

research-article
Security asset elicitation for collaborative models

Building secure systems is a difficult job for most engineers since it requires in-depth understanding of security aspects. This task, however, can be assisted by capturing security knowledge in a particular domain and reusing the knowledge when ...

research-article
Augmented enterprise models as a foundation for generating security-related software: requirements and objectives

The research presented in this paper is aimed at developing a holistic modelling method that comprehensively considers and integrates technical, organizational, behavioral and business aspects -- all crucial to create and manage secure IT systems. Our ...

research-article
Incremental development of large, secure smart card applications

SecureMDD is a model-driven approach to develop security-critical applications. The focus lies on the development of smart card and service applications. Those are inherently security-critical and are based on cryptographic protocols. These protocols ...

research-article
A tool for the synthesis of cryptographic orchestrators

Security is one of the main challenges of service oriented computing. Services need to be loosely coupled, easily accessible and yet provide tight security guarantees enforced by cryptographic protocols. In this paper, we address how to automatically ...

Recommendations