Nothing Special   »   [go: up one dir, main page]

Skip to main content

Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns

  • Conference paper
SDL 2013: Model-Driven Dependability Engineering (SDL 2013)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7916))

Included in the following conference series:

Abstract

Nowadays, many practitioners express their worries about current software engineering practices. New recommendations should be considered to ground software engineering on two pillars: solid theory and proven principles. We took the second pillar towards software engineering for embedded system applications, focusing on the problem of integrating Security and Dependability (S&D) by design to foster reuse. The framework and the methodology we propose associate the model-driven paradigm and a model-based repository of S&D patterns to support the design of trusted Resource Constrained Embedded System (RCES) applications for multiple domains (e.g., railway, metrology, automotive). The approach has been successfully evaluated by the TERESA project external reviewers as well as internally by the Ikerlan Research Center for the railway domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zurawski, R.: Embedded Systems. CRC Press Inc. (2005)

    Google Scholar 

  2. Ravi, S., et al.: Security in embedded systems: Design challenges. Transactions on Embedded Computing Systems (TECS) 3(3), 461–491 (2004)

    Article  Google Scholar 

  3. Hamid, B., Gürgens, S., Jouvray, C., Desnos, N.: Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches. In: Whittle, J., Clark, T., Kühne, T. (eds.) MODELS 2011. LNCS, vol. 6981, pp. 319–333. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Riehle, D., Züllighoven, H.: Understanding and Using Patterns in Software Development. Theory and Practice of Object Systems 2(1), 3–13 (1996)

    Article  Google Scholar 

  5. Serrano, D., Mana, A., Sotirious, A.-D.: Towards Precise Security Patterns. In: 19th International Conference on Database and Expert Systems Application, DEXA 2008, pp. 287–291. IEEE Computer Society (2008), http://doi.ieeecomputersociety.org/10.1109/DEXA.2008.36

  6. Crnkovic, I., et al.: Component-Based Development Process and Component Lifecycle. In: Proceedings of the International Conference on Software Engineering Advances, ICSEA 2006, p. 44. IEEE Computer Society (2006)

    Google Scholar 

  7. Gray, J., et al.: Domain-Specific Modeling. Chapman & Hall/CRC (2007)

    Google Scholar 

  8. Daniels, F., Kim, K., Vouk, M.A.: The reliable hybrid pattern – a generalized software fault tolerant design pattern. In: Pattern Language of Programs, PLoP 1997 (1997), http://hillside.net/plop/plop97/Proceedings/daniels.pdf

  9. Tichy, M., Schilling, D., Giese, H.: Design of self-managing dependable systems with UML and fault tolerance patterns. In: Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, WOSS 2004, pp. 105–109. ACM (2004)

    Google Scholar 

  10. Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. In: Pattern Languages of Programs, PLoP 1998 (1998), http://hillside.net/plop/plop97/Proceedings/yoder.pdf

  11. Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003)

    Book  MATH  Google Scholar 

  12. Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Hatebur, D., Heisel, M., Schmidt, H.: A security engineering process based on patterns. In: Proceedings of the 18th International Workshop on Database and Expert Systems Applications, DEXA 2007, pp. 734–738. IEEE Computer Society (2007)

    Google Scholar 

  14. Halkidis, S.T., Chatzigeorgiou, A., Stephanides, G.: A qualitative analysis of software security patterns. Computers & Security 25(5), 379–392 (2006)

    Article  Google Scholar 

  15. Konrad, S., et al.: Using security patterns to model and analyze security requirements. In: Requirements Engineering for High Assurance Systems, RHAS 2003, pp. 13–22. Software Engineering Institute (2003)

    Google Scholar 

  16. Di Giacomo, V., et al.: Using security and dependability patterns for reaction processes. In: 19th International Workshop on Database and Expert Systems Application, DEXA 2008, pp. 315–319. IEEE Computer Society (2008)

    Google Scholar 

  17. Fernandez, E.B., et al.: Using security patterns to develop secure systems. In: Software Engineering for Secure Systems, pp. 16–31. Information Science Reference (2011)

    Google Scholar 

  18. Alexander, C., Ishikawa, S., Silverstein, M.: A pattern language – towns, buildings, construction, vol. 2. Oxford University Press (1977)

    Google Scholar 

  19. Buschmann, F., Henney, K., Schmidt, D.C.: Pattern-oriented Software Architecture, vol. 4. John Wiley & Sons (2007)

    Google Scholar 

  20. Gamma, E., et al.: Design patterns – Elements of reusable object-oriented software. Addison-Wesley (1995)

    Google Scholar 

  21. Avizienis, A., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)

    Article  Google Scholar 

  22. Steinberg, D., et al.: EMF: Eclipse Modeling Framework 2.0. Addison-Wesley (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hamid, B., Geisel, J., Ziani, A., Bruel, JM., Perez, J. (2013). Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns. In: Khendek, F., Toeroe, M., Gherbi, A., Reed, R. (eds) SDL 2013: Model-Driven Dependability Engineering. SDL 2013. Lecture Notes in Computer Science, vol 7916. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38911-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38911-5_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38910-8

  • Online ISBN: 978-3-642-38911-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics