Specification of Information Flow Security Policies in Model-Based Systems Engineering

被引:1
|
作者
Gerking, Christopher [1 ]
机构
[1] Paderborn Univ, Heinz Nixdorf Inst, Paderborn, Germany
来源
SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS | 2018年 / 11176卷
关键词
Information flow; Security policies; Systems engineering; CYBER-PHYSICAL SYSTEMS; REQUIREMENTS;
D O I
10.1007/978-3-030-04771-9_47
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Model-based systems engineering provides a multi-disciplinary approach to developing cyber-physical systems. Due to their high degree of interconnection, security is a key factor for cyber-physical systems and needs to be front-loaded to the beginning of the development. However, there is a lack of model-based systems engineering approaches that enable the early specification of security policies. As a consequence, security requirements frequently remain unspecified and therefore are hard to satisfy in the downstream development phases. In this paper, we propose to integrate model-based systems engineering with the theory of information flow security. We extend systems engineering models to information flow policies, enabling systems engineers to specify the information flow security requirements of a system under development. On refinement of the resulting models, our approach allows to derive security requirements for individual software components. We illustrate our approach using a model-based design of an autonomous car.
引用
收藏
页码:617 / 632
页数:16
相关论文
共 50 条
  • [1] A Model-Based Approach to Support Systems-of-Systems Security Engineering for Data Policies
    Gianni, Daniele
    Niklas, Lindman
    Joachim, Fuchs
    Robert, Suzic
    Daniel, Fischer
    Insight, 2011, 14 (02) : 18 - 22
  • [2] Model-based security engineering of distributed information systems using UMLsec
    Best, Bastian
    Jurjens, Jan
    Nuseibeh, Bashar
    ICSE 2007: 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2007, : 581 - +
  • [3] Specification, verification, and quantification of security in model-based systems
    Ouchani, Samir
    Debbabi, Mourad
    COMPUTING, 2015, 97 (07) : 691 - 711
  • [4] Specification, verification, and quantification of security in model-based systems
    Samir Ouchani
    Mourad Debbabi
    Computing, 2015, 97 : 691 - 711
  • [5] Model-based security engineering
    Juerjens, Jan
    ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS23 - IS29
  • [6] Model-based security engineering
    Juerjens, Jan
    SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS23 - IS29
  • [7] Model-based security engineering
    Juerjens, Jan
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS23 - IS29
  • [8] Model-based security engineering
    Juerjens, Jan
    WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS23 - IS29
  • [9] Study on Model-Based Security Assessment of Information Systems
    Li, Xiangdong
    Han, Xinchao
    Zheng, Qiusheng
    COMPUTING AND INTELLIGENT SYSTEMS, PT III, 2011, 233 : 401 - 406
  • [10] Study on Model-based Security Assessment of Information Systems
    Li, Xiangdong
    Han, Xinchao
    Zheng, Qiusheng
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 289 - 292