Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants (Record no. 177418)

MARC details
000 -LEADER
fixed length control field 03979nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-3-658-37665-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125405.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220713s2022 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783658376659
-- 978-3-658-37665-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-658-37665-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Peldszus, Sven Matthias.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants
Medium [electronic resource] /
Statement of responsibility, etc by Sven Matthias Peldszus.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2022.
264 #1 -
-- Wiesbaden :
-- Springer Fachmedien Wiesbaden :
-- Imprint: Springer Vieweg,
-- 2022.
300 ## - PHYSICAL DESCRIPTION
Extent XXXVI, 476 p. 138 illus., 80 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Running Example: iTrust -- State of the Art in Secure Software Systems Development -- A Walkthrough of the Proposed Development Approach -- Program Model for Object-oriented Languages -- Model-Synchronization and Tracing -- Application to Legacy Projects using Reverse-Engineering -- Static Security Compliance Checks -- Verification and Enforcement of Security at Run-time -- Specification of Variability throughout Variant-rich Software Systems -- Security in UML Product Lines -- Security Compliance and Restructuring in Variant-rich Software Systems -- The GRaViTY Framework -- Case Studies -- Related Work -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage. About the author Since 2016, Sven Matthias Peldszus has been working as a research associate at the University of Koblenz-Landau and joined the Ruhr University Bochum after defending this thesis. His research interests include continuous tracing of non-functional requirements over the entire software life cycle and software quality analysis in variant-rich software systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security Services.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Principles and Models of Security.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783658376642
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783658376666
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-658-37665-9">https://doi.org/10.1007/978-3-658-37665-9</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in