Usability of Security Specification Approaches for UML Design: A Survey

By: Chamseddine Talhi, D. Mouheb, V. Lima, Mourad Debbabi, L. Wang, M. Pourzandi

Abstract

Security requirements are specified by attaching stereotypes along with their associated tagged values to selected elements of the design (e.g., subsystems, classes, etc.). Thus a “security” profile should be created by some security expert for the specification of these stereotypes. The compiler used to parse UML diagram is then modified such that it can read and interpret the stereotypes annotating the design.

Cite as:

Chamseddine Talhi, D. Mouheb, V. Lima, Mourad Debbabi, L. Wang, M. Pourzandi, “Usability of Security Specification Approaches for UML Design: A Survey”, Journal of Object Technology, Volume 8, no. 6 (September 2009), pp. 103-122, doi:10.5381/jot.2009.8.6.a1.

PDF | HTML | DOI | BiBTeX | Tweet this | Post to CiteULike | Share on LinkedIn

The JOT Journal   |   ISSN 1660-1769   |   DOI 10.5381/jot   |   AITO   |   Open Access   |    Contact