Modeling security requirements for context aware system using UML

نویسنده

  • Saad Almutairi
چکیده

Modeling in general is “an abstract representation of a specification, design or system from a particular point of view”. System modeling is ”a technique to express, visualise, analyse and transform the architecture of a system”. The Unified Modeling Language (UML) is “a language for specifying, visualising, constructing, and documenting the artefacts of a software-intensive system as well as for business modeling and other non-software systems”. UML consists of different types of diagrams such as Use Case diagram, Activity diagram, State diagram and Class diagram. Each type of these diagrams concerns a different aspects of the system development process. Context-Aware Systems (CASs) are primarily associated with Pervasive/Ubiquitous Computing, which has became most prominent since the advent of smart phones and the inclusion of mobility features in computing devices. CASs can sense different aspects of their environment and use the dynamic Context Information (CI) to adapt their behavior accordingly. Hence, various precis of CI, such as User context, Physical context, Computer context and Time context, play a major role in controlling CAS behaviour and functions. Security is considered one of major challenges in CAS specially because such systems often gather sensitive user information; this information may compromise the security of the system if disclosed to unauthorised users. Thus, the design of a CAS must consider system security as a major requirement. Although security is II traditionally considered as a non-functional requirement and is delayed to a later stage of the system development lifecycle, this thesis insists that security must be considered as early as possible because of its high importance. This is also in line with the “secure by design” concept. Therefore, in this thesis the UML diagrams Use Case diagram, Activity diagram and State diagram will be enhanced in order to enable them to model a CAS and then capture its security requirements at the earliest possible stage of the software development process. The contribution to knowledge that this thesis makes is at least threefold, as outlined blow: • Enhancing Use Case diagram notations to express dynamic CAS functional behaviour by showing the influences of CI changes. These extended notations are then used to capture the CAS security requirements. • Enhancing Activity diagram notations in order to demonstrate and clarify the extended Use Case diagram by developing general diagram elements for CASs. This helps to show the data flow during the execution of a CAS function, and then present the security requirements. • Enhancing State diagram notations to depict dynamism and security of a CAS also at this level, and to ultimately support the enhancement on Use Case and Activity diagrams. These extended UML diagrams will be evaluated by applying them to a realworld Case Study to show their practical applicability. The case study is about an infostation-based mobile learning environment. This environment of Mobile Learning (M-learning) is deployed across a university boundary and provides a variety of services such ‘download lecture’ and ‘do exam’ to mobile users. III In conclusion, this research proposes and demonstrates an applicable approach to capture and model security requirements for CASs using innovative extensions of existing types of UML diagrams: Use Case, Activity and State.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

UML-Intensive Framework for Modeling Software Requirements

Abstract. Investigation of software projects has shown that requirements analysis is one of the most problematic activities in software development. Textual requirements specifications are difficult to develop, understand, review, and maintain. Graphical modeling is widely recognized as a more effective analysis tool. Software industry has adopted UML (Unified Modeling Language) as de facto sta...

متن کامل

Modeling Requirements for Security-enhanced Design of Embedded Systems

Designing an embedded system is a complex process that involves working on both hardware and software. The first step in the design process is defining functional and non-functional requirements; among them, it is fundamental to also consider security. We propose an effective way for designers to specify security requirements starting from User Security Requirements. User Security Requirements ...

متن کامل

Tools for Critical Systems Development with UML (Tool Demo)

The high quality development of critical systems (be it dependable, security-critical, real-time, or performance-critical systems) is difficult. Many critical systems are developed, deployed, and used that do not satisfy their criticality requirements, sometimes with spectacular failures. UML offers an opportunity for high-quality critical systems development that is feasible in an industrial c...

متن کامل

Context-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network

Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013