Modeling Security Protocols using UML2

نویسندگان

  • Alain Beaulieu
  • Greg Phillips
  • Sandra Smith
چکیده

Security protocols must be designed to ensure the integrity of electronic communications between participants. Although the design of secure communication protocols has improved over the years the tasks of building and validating these protocols remain inherently difficult. Security protocols may fail due to unintended use, malicious attacks, incorrect logic or incorrect transition from design to code. We present our research to investigate the use of UML 2 to model, verify and validate

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Consistency Checks for Duties in Extended UML2 Activity Models

Process-aware information systems support the execution of business processes. In this context, organizations require the precise specification of security policies that govern the behavior of subjects in the systems. Obligation policies specify duties to be fulfilled by certain subjects. In organizational contexts, duties are often associated with a certain task in a business process. In this ...

متن کامل

Papyrus: A UML2 Tool for Domain-Specific Language Modeling

This chapter outlines Papyrus, a tool for graphical modeling of UML2 applications. It is an open-source project, designed as an Eclipse component, and is based on the existing EMF-based realization of the UML2 meta-model. The goal of this open-source project project is twofold. First, it aims at providing a complete, efficient, robust, and methodologically agnostic implementation of a UML tool ...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

UML2 Profile for Modeling Controlled Data Parallel Applications

In this paper, we present an UML2 profile introducing control in the Gaspard2 data parallel applications using the synchronous approach. This concept allows to take the change of running mode into account in the case of parallel applications. It is then possible to study more general systems mixing control and data parallel processing.

متن کامل

Modeling the Evolution of Aspect Configurations using Model Transformations

In this paper we introduce an approach to address the evolution of aspect configurations with model transformations. We use model transformation diagrams (MTDs) to define valid behavioral model states of a system as well as valid transitions between those states. MTD transformations can be used to define evolutionary changes in the weaving process of an aspect-oriented system. To allow for a st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008