• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    • Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • An approach to the specification of security concerns in UML

    Author(s)
    Tran, Xuan-Vinh
    Truong, Ninh-Thuan
    Nguyen, Anne
    Griffith University Author(s)
    Nguyen, Anne T.
    Year published
    2013
    Metadata
    Show full item record
    Abstract
    The Object Oriented methodology has been applied in software engineering for a wide range of large and critical systems. One of the modeling languages frequently used for this purpose is UML. As yet, however, the means provided by UML to specify and deal with security concerns are rather sparse. In this paper we propose a practical approach that could readily be incorporated into existing software development processes. We begin by reviewing the main types of security concerns in the various phases of the software development cycle, and set up stereotypes to specify those concerns. The stereotypes are then attached to use ...
    View more >
    The Object Oriented methodology has been applied in software engineering for a wide range of large and critical systems. One of the modeling languages frequently used for this purpose is UML. As yet, however, the means provided by UML to specify and deal with security concerns are rather sparse. In this paper we propose a practical approach that could readily be incorporated into existing software development processes. We begin by reviewing the main types of security concerns in the various phases of the software development cycle, and set up stereotypes to specify those concerns. The stereotypes are then attached to use case diagrams and later to activity diagrams (and other derived diagrams). At the implementation stage, security concerns can be transformed into more detailed aspects via AOP (aspect oriented programming) techniques. By maintaining the consistency of security stereotypes from phase to phase, the concerns about system security are implemented in a traceable fashion. Such use of security stereotypes does not require a high level of skills or deep knowledge of UML, and can therefore be integrated, with relatively little effort, with many current system development methodologies.
    View less >
    Conference Title
    Robot Intelligence Technology and Applications: Proceedings of the 1st International Conference on Robot Intelligence Technology and Applications 2012
    Publisher URI
    http://rita2012.org/main/
    Subject
    Computer System Security
    Publication URI
    http://hdl.handle.net/10072/54126
    Collection
    • Conference outputs

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander