Model-Based Privacy and Security Analysis with CARiSMA

被引:15
作者
Ahmadian, Amir Shayan [1 ]
Peldszus, Sven [1 ]
Ramadan, Qusai [1 ]
Juerjens, Jan [1 ]
机构
[1] Univ Koblenz Landau, Mainz, Germany
来源
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING | 2017年
关键词
System design analysis; Model-based analysis; Privacy; Security;
D O I
10.1145/3106237.3122823
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present CARiSMA, a tool that is originally designed to support model-based security analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA to support the privacy of personal data. Moreover, we introduced a mechanism to assist the system designers to perform a CARiSMA analysis by automatically initializing an appropriate CARiSMA analysis concerning security and privacy requirements. The motivation for our work is Article 25 of Regulation (EU) 2016/679, which requires appropriate technical and organizational controls must be implemented for ensuring that, by default, the processing of personal data complies with the principles on processing of personal data. This implies that initially IT systems must be analyzed to verify if such principles are respected. System models allow the system developers to handle the complexity of systems and to focus on key aspects such as privacy and security. CARiSMA is available at (http://carisma.umlsec.de) and our screen cast at (https://youtu.be/b5zeHig3ARw).
引用
收藏
页码:989 / 993
页数:5
相关论文
共 29 条
[1]  
AHMADIAN A. S, 2017, ECMFA IN PRESS
[2]  
BARKER K, 2009, DAT FIN FRONT, V5588, P42
[3]  
Cavoukian A., 2009, P 2009 C CTR ADV STU, P358
[4]  
COLOMBO P, 2012, SOCIALCOM PASSAT, P81
[5]  
DANEZIS G, 2015, CORRABS150103726
[6]   Model-based security analysis in seven steps - a guided tour to the CORAS method [J].
den Braber, F. ;
Hogganvik, I. ;
Lund, M. S. ;
Stolen, K. ;
Vraalsen, F. .
BT TECHNOLOGY JOURNAL, 2007, 25 (01) :101-117
[7]   An aspect-oriented methodology for designing secure applications [J].
Georg, Geri ;
Ray, Indrakshi ;
Anastasaki, Kyriakos ;
Bordbar, Behzad ;
Toahchoodee, Manachai ;
Houmb, Siv Hilde .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) :846-864
[8]  
Gollmann D., 1999, COMPUTER SECURITY
[9]   Applying formal methods to a certifiably secure software system [J].
Heitmeyer, Constance L. ;
Archer, Myla M. ;
Leonard, Elizabeth I. ;
McLean, John D. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) :82-98
[10]  
Islam S, 2011, CAISE FORUM, V734, P89