Advances in Model-Driven Security

Sound methodologies for constructing security-critical systems are extremely important in order to confront the increasingly varied security threats. As a response to this need, Model-Driven Security has emerged in the early 2000s as a specialized Model-Driven Engineering approach for supporting the development of security-critical systems. In this chapter we summarize the most important developments of Model-Driven Security during the past decade. In order to do so we start by building a taxonomy of the most important concepts of this domain. We then use our taxonomy to describe and evaluate a set of representative and influential Model-Driven Security approaches in the literature. In our development of this topic we concentrate on the concepts shared by Model-Driven Engineering and Model-Driven Security. This allows us to identify and debate the advantages, disadvantages, and open issues when applying Model-Driven Engineering to the Information Security domain. This chapter provides a broad view of Model-Driven Security and is intended as an introduction to Model-Driven Security for students, researchers, and practitioners.

[1]  Jan Jürjens,et al.  Model-based security analysis for mobile communications , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.

[2]  Jan Jürjens,et al.  Developing secure networked Web-based systems using model-based risk assessment and UMLsec , 2003, Tenth Asia-Pacific Software Engineering Conference, 2003..

[3]  Robert B. France,et al.  A Generic Approach for Automatic Model Composition , 2008, MoDELS.

[4]  Hassan Gomaa,et al.  Separating Application and Security Concerns in Modeling Software Product Lines , 2009 .

[5]  Ruth Breu,et al.  Sectet: an extensible framework for the realization of secure inter-organizational workflows , 2006, Internet Res..

[6]  David A. Basin,et al.  Automatic Generation of Smart, Security-Aware GUI Models , 2010, ESSoS.

[7]  Daniel Jackson,et al.  Software Abstractions - Logic, Language, and Analysis , 2006 .

[8]  Mohammad Zulkernine,et al.  A model-based aspect-oriented framework for building intrusion-aware software systems , 2009, Inf. Softw. Technol..

[9]  Jacques Klein,et al.  A Systematic Review of Model-Driven Security , 2013, 2013 20th Asia-Pacific Software Engineering Conference (APSEC).

[10]  Bashar Nuseibeh,et al.  Model-Based Security Engineering of Distributed Information Systems Using UMLsec , 2007, 29th International Conference on Software Engineering (ICSE'07).

[11]  Gregor Kiczales,et al.  Aspect-oriented programming , 1996, CSUR.

[12]  Jacques Klein,et al.  Aspect Model Unweaving , 2009, MoDELS.

[13]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[14]  Jacques Klein,et al.  Weaving Multiple Aspects in Sequence Diagrams , 2007, LNCS Trans. Aspect Oriented Softw. Dev..

[15]  Egon Börger,et al.  Java and the Java Virtual Machine: Definition, Verification, Validation , 2001 .

[16]  Siobhán Clarke,et al.  Aspect-oriented analysis and design - the theme approach , 2005, Addison Wesley object technology series.

[17]  AMIR A. KHWAJA,et al.  A Synthesis of Evaluation Criteria for Software Specifications and Specification Techniques , 2002, Int. J. Softw. Eng. Knowl. Eng..

[18]  Jacques Klein,et al.  Semantic-based weaving of scenarios , 2006, AOSD.

[19]  Ruth Breu,et al.  A constraint based role based access control in the SECTET a model-driven approach , 2006, PST.

[20]  Ruth Breu,et al.  Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET , 2006, PST.

[21]  Jan Jürjens,et al.  Model-Based Security Engineering with UML , 2004, FOSAD.

[22]  M. Breu,et al.  Model driven security for Web services (MDS4WS) , 2004, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..

[23]  Ruth Breu,et al.  Model based development of access policies , 2007, International Journal on Software Tools for Technology Transfer.

[24]  Viviane Torres da Silva,et al.  Model-Driven Security in Practice: An Industrial Experience , 2008, ECMDA-FA.

[25]  Julio Cesar Sampaio do Prado Leite,et al.  Non-functional requirements: from elicitation to modelling languages , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.

[26]  Kurt Stenzel,et al.  Generating formal specifications for security-critical applications - A model-driven approach , 2009, 2009 ICSE Workshop on Software Engineering for Secure Systems.

[27]  Kurt Stenzel,et al.  SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications , 2009, 2009 International Conference on Availability, Reliability and Security.

[28]  João Araújo,et al.  MATA: A Unified Approach for Composing UML Aspect Models Based on Graph Transformation , 2009, LNCS Trans. Aspect Oriented Softw. Dev..

[29]  Christian Wagner,et al.  Model-driven Security: from Theory to Application , 2012 .

[30]  Siobhán Clarke,et al.  Composition of Object-Oriented Software Design Models , 2001 .

[31]  Li Yang,et al.  Secure software architectures design by aspect orientation , 2005, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05).

[32]  James R. Cordy,et al.  Analysis of Model Transformations , 2012 .

[33]  Hans Vangheluwe,et al.  Addressing Security Requirements Through Multi-Formalism Modelling and Model Transformation , 2007, ICSOFT.

[34]  Ulrich Lang,et al.  Model Driven Security Management: Making Security Management Manageable in Complex Distributed Systems , 2008, MODSEC@MoDELS.

[35]  Mario Piattini,et al.  CIM to PIM Transformation: A Reality , 2007, CONFENIS.

[36]  João Araújo,et al.  Scenario modelling with aspects , 2004, IEE Proc. Softw..

[37]  Jan Jürjens,et al.  Towards Development of Secure Systems Using UMLsec , 2001, FASE.

[38]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[39]  Jean-Marc Jézéquel,et al.  Weaving executability into object-oriented meta-languages , 2005, MoDELS'05.

[40]  Hélène Kirchner,et al.  Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets , 2011, IEEE Transactions on Dependable and Secure Computing.

[41]  Jan Jürjens Formal Semantics for Interacting UML subsystems , 2002, FMOODS.

[42]  Ivar Jacobson,et al.  Aspect-oriented software development with use cases , 2005, Addison Wesley object technology series.

[43]  Jean-Pierre Seifert,et al.  A Model-Driven Framework for Trusted Computing Based Systems , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).

[44]  Mario Piattini,et al.  Designing secure databases , 2005, Inf. Softw. Technol..

[45]  Thomas Neubauer,et al.  Model-Driven Development Meets Security: An Evaluation of Current Approaches , 2011, 2011 44th Hawaii International Conference on System Sciences.

[46]  Hartmut Ehrig,et al.  Fundamentals of Algebraic Graph Transformation (Monographs in Theoretical Computer Science. An EATCS Series) , 1992 .

[47]  Jacques Klein,et al.  Aspect-Oriented Design with Reusable Aspect Models , 2010, LNCS Trans. Aspect Oriented Softw. Dev..

[48]  Xavier Crégut,et al.  A Framework to Formalise the MDE Foundations , 2007 .

[49]  Michael Howard,et al.  The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .

[50]  Shane Sendall,et al.  Model Transformation: The Heart and Soul of Model-Driven Software Development , 2003, IEEE Softw..

[51]  Ruth Breu,et al.  Model-Driven Configuration of SELinux Policies , 2009, OTM Conferences.

[52]  Ruth Breu,et al.  Model-Driven Security Engineering for Trust Management in SECTET , 2007, J. Softw..

[53]  Jacques Klein,et al.  Flexible model element introduction policies for aspect-oriented modeling , 2010, MODELS'10.

[54]  Martin Gogolla,et al.  Typing Model Transformations Using Tracts , 2012, ICMT@TOOLS.

[55]  Jan Jürjens,et al.  Security Analysis of a Biometric Authentication System Using UMLsec and JML , 2009, MoDELS.

[56]  Ruth Breu,et al.  Model Driven Security for Inter-organizational Workflows in e-Government , 2005, TCGOV.

[57]  Pieter J. Mosterman,et al.  Computer Automated Multi-Paradigm Modeling : An Introduction , 2000 .

[58]  Bart De Decker,et al.  A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System , 2008, EuroPKI.

[59]  Mario Piattini,et al.  Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases , 2007, BPM.

[60]  Martin Gilje Jaatun,et al.  Security in Model Driven Development: A Survey , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[61]  Ruth Breu,et al.  Modelling inter-organizational workflow security in a peer-to-peer environment , 2005, IEEE International Conference on Web Services (ICWS'05).

[62]  Levi Lucio,et al.  A technique for automatic validation of model transformations , 2010, MODELS'10.

[63]  Jean Bézivin,et al.  Model Driven Engineering: An Emerging Technical Space , 2005, GTTSE.

[64]  Zahir Tari,et al.  On the Move to Meaningful Internet Systems. OTM 2018 Conferences , 2018, Lecture Notes in Computer Science.

[65]  Colin Atkinson,et al.  Orthographic Service Modeling , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.

[66]  Bart De Decker,et al.  Privacy-Preserving Telemonitoring for eHealth , 2009, DBSec.

[67]  Torsten Lodderstedt,et al.  Model driven security from UML models to access control architectures , 2003 .

[68]  Jan Jürjens,et al.  UMLsec: Extending UML for Secure Systems Development , 2002, UML.

[69]  Martin Gogolla,et al.  Verification of ATL Transformations Using Transformation Models and Model Finders , 2012, ICFEM.

[70]  David A. Basin,et al.  Automated analysis of security-design models , 2009, Inf. Softw. Technol..

[71]  Basit Shafiq,et al.  A role-based access control policy verification framework for real-time systems , 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.

[72]  José Ambrosio Toval Álvarez,et al.  ModelSec: A Generative Architecture for Model-Driven Security , 2009, J. Univers. Comput. Sci..

[73]  Michael Hafner,et al.  Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet , 2008, MoDELS.

[74]  Jan Jürjens Code security analysis of a biometric authentication system using automated theorem provers , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[75]  Jan Jürjens Sound methods and effective tools for model-based security engineering with UML , 2005, ICSE.

[76]  Jan Jürjens Developing Secure Embedded Systems: Pitfalls and How to Avoid Them , 2007, 29th International Conference on Software Engineering (ICSE'07 Companion).

[77]  Kurt Stenzel,et al.  Formal Verification of Application-Specific Security Properties in a Model-Driven Approach , 2010, ESSoS.

[78]  Kurt Stenzel,et al.  Incremental development of large, secure smart card applications , 2012, MDsec '12.

[79]  Juan de Lara,et al.  AToM3: A Tool for Multi-formalism and Meta-modelling , 2002, FASE.

[80]  Cristina V. Lopes,et al.  Aspect-oriented programming , 1999, ECOOP Workshops.

[81]  R. France,et al.  Aspect-oriented approach to early design modelling , 2004, IEE Proc. Softw..

[82]  Jan Jürjens,et al.  Systematic Development of UMLsec Design Models Based on Security Requirements , 2011, FASE.

[83]  Ruth Breu,et al.  A Framework for Modeling Restricted Delegation in Service Oriented Architecture , 2006, TrustBus.

[84]  David A. Basin,et al.  A decade of model-driven security , 2011, SACMAT '11.

[85]  José de la Peña Muñoz Information Security Industry: State of the Art , 2008, ISSE.

[86]  Ruth Breu,et al.  Security engineering for service-oriented architectures , 2008 .

[87]  Anneke Kleppe,et al.  MDA explained - the Model Driven Architecture: practice and promise , 2003, Addison Wesley object technology series.

[88]  Jürgen Dingel,et al.  A Tridimensional Approach for Studying the Formal Verification of Model Transformations , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[89]  Ruth Breu,et al.  Model-Driven Security Engineering of Service Oriented Systems , 2008, UNISCON.

[90]  Ruth Breu,et al.  Towards a MOF/QVT-Based domain architecture for model driven security , 2006, MoDELS'06.

[91]  David A. Basin,et al.  Model driven security for process-oriented systems , 2003, SACMAT '03.

[92]  Robert B. France,et al.  Directives for Composing Aspect-Oriented Design Class Models , 2006, LNCS Trans. Aspect Oriented Softw. Dev..

[93]  Brice Morin,et al.  Taming Dynamically Adaptive Systems using models and aspects , 2009, 2009 IEEE 31st International Conference on Software Engineering.

[94]  Mike Papadakis,et al.  Mutation based test case generation via a path selection strategy , 2012, Inf. Softw. Technol..

[95]  Jacques Klein,et al.  Achieving Practical Genericity in Model Weaving through Extensibility , 2013, ICMT.

[96]  Thomas Cottenier The Motorola WEAVR : Model Weaving in a Large Industrial Context , 2006 .

[97]  Eugene Syriani,et al.  A multi-paradigm foundation for model transformation language engineering , 2011 .

[98]  Steve Cook,et al.  Domain-Specific Development with Visual Studio DSL Tools , 2007 .

[99]  Jürgen Dingel,et al.  Model transformation testing: the state of the art , 2012, AMT '12.

[100]  Jacques Klein,et al.  A generic weaver for supporting product lines , 2008, EA '08.

[101]  Claudia Steinberger,et al.  Information Systems and e-Business Technologies , 2008 .

[102]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[103]  David Basin,et al.  Model driven security: From UML models to access control infrastructures , 2006, TSEM.

[104]  Jan Jürjens Sound methods and effective tools for model-based security engineering with UML , 2005, ICSE '05.

[105]  Kurt Stenzel,et al.  Model-Driven Code Generation for Secure Smart Card Applications , 2009, 2009 Australian Software Engineering Conference.

[106]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[107]  Gerti Kappel,et al.  Automated verification of model transformations based on visual contracts , 2013, Automated Software Engineering.