Abstract
Nowadays, many practitioners express their worries about current software engineering practices. New recommendations should be considered to ground software engineering on two pillars: solid theory and proven principles. We took the second pillar towards software engineering for embedded system applications, focusing on the problem of integrating Security and Dependability (S&D) by design to foster reuse. The framework and the methodology we propose associate the model-driven paradigm and a model-based repository of S&D patterns to support the design of trusted Resource Constrained Embedded System (RCES) applications for multiple domains (e.g., railway, metrology, automotive). The approach has been successfully evaluated by the TERESA project external reviewers as well as internally by the Ikerlan Research Center for the railway domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zurawski, R.: Embedded Systems. CRC Press Inc. (2005)
Ravi, S., et al.: Security in embedded systems: Design challenges. Transactions on Embedded Computing Systems (TECS) 3(3), 461–491 (2004)
Hamid, B., Gürgens, S., Jouvray, C., Desnos, N.: Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches. In: Whittle, J., Clark, T., Kühne, T. (eds.) MODELS 2011. LNCS, vol. 6981, pp. 319–333. Springer, Heidelberg (2011)
Riehle, D., Züllighoven, H.: Understanding and Using Patterns in Software Development. Theory and Practice of Object Systems 2(1), 3–13 (1996)
Serrano, D., Mana, A., Sotirious, A.-D.: Towards Precise Security Patterns. In: 19th International Conference on Database and Expert Systems Application, DEXA 2008, pp. 287–291. IEEE Computer Society (2008), http://doi.ieeecomputersociety.org/10.1109/DEXA.2008.36
Crnkovic, I., et al.: Component-Based Development Process and Component Lifecycle. In: Proceedings of the International Conference on Software Engineering Advances, ICSEA 2006, p. 44. IEEE Computer Society (2006)
Gray, J., et al.: Domain-Specific Modeling. Chapman & Hall/CRC (2007)
Daniels, F., Kim, K., Vouk, M.A.: The reliable hybrid pattern – a generalized software fault tolerant design pattern. In: Pattern Language of Programs, PLoP 1997 (1997), http://hillside.net/plop/plop97/Proceedings/daniels.pdf
Tichy, M., Schilling, D., Giese, H.: Design of self-managing dependable systems with UML and fault tolerance patterns. In: Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, WOSS 2004, pp. 105–109. ACM (2004)
Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. In: Pattern Languages of Programs, PLoP 1998 (1998), http://hillside.net/plop/plop97/Proceedings/yoder.pdf
Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003)
Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)
Hatebur, D., Heisel, M., Schmidt, H.: A security engineering process based on patterns. In: Proceedings of the 18th International Workshop on Database and Expert Systems Applications, DEXA 2007, pp. 734–738. IEEE Computer Society (2007)
Halkidis, S.T., Chatzigeorgiou, A., Stephanides, G.: A qualitative analysis of software security patterns. Computers & Security 25(5), 379–392 (2006)
Konrad, S., et al.: Using security patterns to model and analyze security requirements. In: Requirements Engineering for High Assurance Systems, RHAS 2003, pp. 13–22. Software Engineering Institute (2003)
Di Giacomo, V., et al.: Using security and dependability patterns for reaction processes. In: 19th International Workshop on Database and Expert Systems Application, DEXA 2008, pp. 315–319. IEEE Computer Society (2008)
Fernandez, E.B., et al.: Using security patterns to develop secure systems. In: Software Engineering for Secure Systems, pp. 16–31. Information Science Reference (2011)
Alexander, C., Ishikawa, S., Silverstein, M.: A pattern language – towns, buildings, construction, vol. 2. Oxford University Press (1977)
Buschmann, F., Henney, K., Schmidt, D.C.: Pattern-oriented Software Architecture, vol. 4. John Wiley & Sons (2007)
Gamma, E., et al.: Design patterns – Elements of reusable object-oriented software. Addison-Wesley (1995)
Avizienis, A., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
Steinberg, D., et al.: EMF: Eclipse Modeling Framework 2.0. Addison-Wesley (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hamid, B., Geisel, J., Ziani, A., Bruel, JM., Perez, J. (2013). Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns. In: Khendek, F., Toeroe, M., Gherbi, A., Reed, R. (eds) SDL 2013: Model-Driven Dependability Engineering. SDL 2013. Lecture Notes in Computer Science, vol 7916. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38911-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-38911-5_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38910-8
Online ISBN: 978-3-642-38911-5
eBook Packages: Computer ScienceComputer Science (R0)