Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1868433.1868435acmotherconferencesArticle/Chapter ViewAbstractPublication Pagess-n-d4rcesConference Proceedingsconference-collections
research-article

Enforcing trust in embedded systems using models

Published: 14 September 2010 Publication History

Abstract

Embedded systems are intensely used in many domains such as automotive, aerospace, home control, and telecommunication systems. Generally, embedded systems are viewed as time and resource constrained systems.
Now, trust is becoming an increasingly important issue in the field of embedded systems. Trust is the level of security and dependability (S&D) achieved by an implementation. The consequence is that specifications of embedded systems contain many S&D requirements. The main goal of trust is that an accidental or intentional fault will be confined and will not throw S&D features into question.
To reduce the risk of design fault, it is necessary to maximize the automation of steps in the system development cycle. This need in the development process can be satisfied by model driven engineering. However, it is necessary to adapt current model-based methodologies by enriching them with S&D concepts.
This paper presents a model-driven approach customized by S&D concerns. This approach involves the definition of a trust-aware platform-independent architecture. In order to complete the process, model based solutions dedicated to developers are presented.

References

[1]
}}AUTOSAR Consortium. Specification of operating system v4.0.0. AUTOSAR Specifications, 2009.
[2]
}}A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, pages Vol. 1, pp. 11--33., january-march 2004.
[3]
}}C. Bock. Uml 2 composition model. Journal of Object Technology, Vol. 3, No. 10, pages pp 47--73, November-December 2004.
[4]
}}C. C. Burt, B. R. Bryant, R. R. Raje, A. Olson, and M. Auguston. Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control. Proceedings of the Seventh IEEE International Enterprise Distributed Object Computing Conference (EDOC'03), page pp. 159, 2003.
[5]
}}V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Theory of Privacy and Anonymity. Algorithms and Theory of Computation Handbook, second edition, M. Atallah and M. Blanton (eds), CRC Press, 2008.
[6]
}}A. Crespo, I. Ripoll, and M. Mamsmano. Partitioned Embedded Architecture based on Hypervisor: the XtratuM approach. Proceedings of the Eighth European Dependable Computing Conference (EDCC-8), pages pp. 67--72, 2010.
[7]
}}N. Cuppens, F. Cuppens, D. Abi Haidar, and H. Debar. Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC'08: 23rd International Information Security Conference, september 8--10, Milan, Italie, pages pp. 173--187, 2008.
[8]
}}J. L. Fernadez, R. Alonzo, F. Goméz, C. Jouvray, Y. Rouxel, and A. Pérez. Requirements Engineering of Trusted Embedded Systems. INCOSE, 2010.
[9]
}}R. P. Goldberg. Survey of Virtual Machine Research. IEEE Computer Magazine, pages Vol. 7(6), pp. 34--45, 1974.
[10]
}}W. Hassan and L. Logrippo. Governance Policies for Privacy Access Control and their Interactions. Feature Interactions in Telecommunications and Software Systems VIII. IOS Press., June 2005.
[11]
}}S. H. Houmb, F. den Braber, M. S. Lund, and K. Stolen. Towards a uml profile for model-based risk assessment. Critical systems development with UML. Proceeding of the UML'02 workshop, pages 79--91, 2002.
[12]
}}S. H. Houmb and K. K. Hansen. Towards a UML Profile for Security Assessment. UML 2003, Workshop on Critical Systems Development with UML, pages 815--829.
[13]
}}C. Jouvray, G. Chartier, N. Francois, I. Ripoll, M. Mamsmano, and A. Crespo. Enforcing trust in automotive control platform. 1st workshop on Critical Automotive applications: Robustness & Safety (CARS@EDCC), pages pp. 43--46, 2010.
[14]
}}J. Jürjens. Towards development of secure systems using UMLSec. 4th International Conference on Fundamental Approaches to Software Enineering, pages pp. 32--42, 2001.
[15]
}}J. Kirch. Virtual Machine Security Guidelines. The center for internet security. Version 1.0, 2007.
[16]
}}M. Kunh. Introduction to security. Presentation at Cambridge University, 2008.
[17]
}}T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. "UML" 2002 - The Unified Modeling Language, pages Volume 2460/2002, pp. 426--441, 2002.
[18]
}}J. Muskens. Definitions of trust. ITEA Trust4All, 2005.
[19]
}}Network Working Group. Internet security glossary. RFC 4949, Version 2, 2007.
[20]
}}OASIS Open. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 1 February 2005.
[21]
}}OMG. OMG Unified Modeling Language (OMG UML), Superstructure. formal/2009-02-02, February 2009.
[22]
}}OMG. A UML profile for MARTE: Modeling and analysis of real-time embedded systems. ptc/2008-06-09, June 2008.
[23]
}}OMG. Object Constraint Language. formal/06-05-01, May 2006.
[24]
}}A. Pfitzmann and M. Hansen. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.33.pdf, Apr. 2010. v0.33.
[25]
}}D. Powell and R. Stroud. Conceptual model and architecture of maftia. Project IST-1999-11583. Deliverable D 21, january 2003.
[26]
}}J. S. Reuben. A survey on virtual machine security. Seminar on Network Security, 2007.
[27]
}}R. Sandhu, and Q. Munawer. How to do discretionary access control using roles. 3rd ACM Workshop on Role-BasedAccess Control, pages pp. 47--54, 1998.
[28]
}}R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. IEEE Computer, (2):Vol. 29, No. 2, pp. 38--47, February 1996.
[29]
}}D. Schmidt. Model-Driven Engineering. IEEE Computer, pages Vol. 39(2), pp. 41--47., 2006.
[30]
}}Trusted Computing Group. Trusted computing group. http://www.trustedcomputinggroup.org/trusted_computing, 2009.
[31]
}}P. E. Veríssimo, N. F. Neves, and M. P. Correia. Intrusion-Tolerant Architectures: Concepts and Design. Architecting Dependable Systems, pages vol. 2677. pp 3--36, 2003.

Cited By

View all
  • (2016)Understanding the trust of software-intensive distributed systemsConcurrency and Computation: Practice & Experience10.1002/cpe.365628:1(114-143)Online publication date: 1-Jan-2016
  • (2011)Defining trust evidenceProceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research10.1145/2179298.2179373(1-1)Online publication date: 12-Oct-2011

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
S&D4RCES '10: Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
September 2010
63 pages
ISBN:9781450303682
DOI:10.1145/1868433
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dependability
  2. model driven engineering
  3. resource constrained embedded systems
  4. security
  5. trust computing

Qualifiers

  • Research-article

Conference

S&D4RCES '10

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Understanding the trust of software-intensive distributed systemsConcurrency and Computation: Practice & Experience10.1002/cpe.365628:1(114-143)Online publication date: 1-Jan-2016
  • (2011)Defining trust evidenceProceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research10.1145/2179298.2179373(1-1)Online publication date: 12-Oct-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media