Modeling Security Protocols using UML2
نویسندگان
چکیده
Security protocols must be designed to ensure the integrity of electronic communications between participants. Although the design of secure communication protocols has improved over the years the tasks of building and validating these protocols remain inherently difficult. Security protocols may fail due to unintended use, malicious attacks, incorrect logic or incorrect transition from design to code. We present our research to investigate the use of UML 2 to model, verify and validate
منابع مشابه
Consistency Checks for Duties in Extended UML2 Activity Models
Process-aware information systems support the execution of business processes. In this context, organizations require the precise specification of security policies that govern the behavior of subjects in the systems. Obligation policies specify duties to be fulfilled by certain subjects. In organizational contexts, duties are often associated with a certain task in a business process. In this ...
متن کاملPapyrus: A UML2 Tool for Domain-Specific Language Modeling
This chapter outlines Papyrus, a tool for graphical modeling of UML2 applications. It is an open-source project, designed as an Eclipse component, and is based on the existing EMF-based realization of the UML2 meta-model. The goal of this open-source project project is twofold. First, it aims at providing a complete, efficient, robust, and methodologically agnostic implementation of a UML tool ...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملUML2 Profile for Modeling Controlled Data Parallel Applications
In this paper, we present an UML2 profile introducing control in the Gaspard2 data parallel applications using the synchronous approach. This concept allows to take the change of running mode into account in the case of parallel applications. It is then possible to study more general systems mixing control and data parallel processing.
متن کاملModeling the Evolution of Aspect Configurations using Model Transformations
In this paper we introduce an approach to address the evolution of aspect configurations with model transformations. We use model transformation diagrams (MTDs) to define valid behavioral model states of a system as well as valid transitions between those states. MTD transformations can be used to define evolutionary changes in the weaving process of an aspect-oriented system. To allow for a st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008