Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded Systems

Security and Dependability (S&D) becomes a strong requirement even in resource constraint embedded systems (RCES). Many domains are not traditionally involved in this kind of issue and have to adapt theirs current processes.

[1]  Richard Zurawski,et al.  Embedded Systems Handbook , 2004 .

[2]  Hironori Washizaki,et al.  A survey on security patterns , 2008 .

[3]  Amnon H. Eden,et al.  LePUS3: An Object-Oriented Design Description Language , 2008, Diagrams.

[4]  Jean-Marc Jézéquel,et al.  ≪UML≫ 2002 — The Unified Modeling Language , 2002, Lecture Notes in Computer Science.

[5]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[6]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[7]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[8]  Markus Schumacher,et al.  Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.

[9]  Thomas A Henzinger,et al.  Two challenges in embedded systems design: predictability and robustness , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[10]  Bruce Powell Douglass,et al.  Real-time UML (2nd ed.): developing efficient objects for embedded systems , 1997 .

[11]  Hermann Kopetz,et al.  The Complexity Challenge in Embedded System Design , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[12]  Holger Giese,et al.  Design of self-managing dependable systems with UML and fault tolerance patterns , 2004, WOSS '04.

[13]  Antonio Maña,et al.  Towards Precise Security Patterns , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.

[14]  Alan W. Brown,et al.  The Current State , 2016 .

[15]  Garry D. Coleman,et al.  Advancing the Standard , 1999 .

[16]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[17]  Joseph W. Yoder,et al.  Architectural Patterns for Enabling Application Security , 1998 .

[18]  Massimo Felici,et al.  Using Security and Dependability Patterns for Reaction Processes , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.

[19]  John Grundy,et al.  Design pattern modelling and instantiation using DPML , 2002 .

[20]  Jacques D. Fleuriot,et al.  Diagrammatically-Driven Formal Verification of Web-Services Composition , 2012, Diagrams.

[21]  Murray Silverstein,et al.  A Pattern Language , 1977 .

[22]  Jan Jürjens,et al.  UMLsec: Extending UML for Secure Systems Development , 2002, UML.

[23]  Mladen A. Vouk,et al.  The Reliable Hybrid Pattern A Generalized Software Fault Tolerant Design Pattern , 1997 .

[24]  Jean-Marc Jézéquel,et al.  Precise Modeling of Design Patterns , 2000, UML.