End-to-end integrated security and performance analysis on the DEGAS choreographer platform

被引:0
|
作者
Buchholtz, M [1 ]
Gilmore, S
Haenel, V
Montangero, C
机构
[1] Tech Univ Denmark, DK-2800 Lyngby, Denmark
[2] Univ Edinburgh, Lab Fdn Comp Sci, Edinburgh EH8 9YL, Midlothian, Scotland
[3] Univ Pisa, Dipartimento Informat, I-56100 Pisa, Italy
来源
关键词
security analysis; performance analysis; process calculi; UML;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is presented to the platform for analysis, formal content is extracted in the form of process calculi descriptions, analysed with the analysers of the calculi, and the results of the analysis are reflected back into a modified version of the input UML model. The design platform supporting the methodology, Choreographer, interoperates with state-of-the-art UML modelling tools. We illustrate the approach with a well known protocol and report on the experience of industrial users who have applied Choreographer in their development work.
引用
收藏
页码:286 / 301
页数:16
相关论文
共 50 条
  • [1] Designing a holistic end-to-end intelligent network analysis and security platform
    Alzahrani, M.
    2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
  • [2] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [3] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [4] Performance Analysis of End-to-End Sensor-to-Cloud Personal Living Platform
    Goleva, Rossitza
    Stainov, Rumen
    Kletnikov, Nikola
    Achkoski, Jugoslav
    Mirtchev, Seferin
    Ganchev, Ivan
    Savov, Aleksandar
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 615 - 620
  • [5] An End-to-End Domain Specific Modeling and Analysis Platform
    Shahbazian, Arman
    Edwards, George
    Medvidovic, Nenad
    2016 IEEE/ACM 8TH INTERNATIONAL WORKSHOP ON MODELING IN SOFTWARE ENGINEERING (MISE), 2016, : 8 - 12
  • [6] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [7] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [8] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [9] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [10] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259