Login       My Wishlist
  My Cart
$0.00 / 0 items
 
EMS Linux
Utilizing the Best Tools With Linux
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   Programming

Aspect-Oriented Security Hardening of UML Design Models


Free Shipping Included! Aspect-Oriented Security Hardening of UML Design Models by Springer at EMS Linux. Hurry! Limited time offer. Offer valid only while supplies last. This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML


Product Description

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models.

The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11.

The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.

Additional Information

Manufacturer:Springer
Publisher:Springer
Studio:Springer
EAN:9783319368948
Item Size:0.58 x 9.25 x 9.25 inches
Package Weight:0.88 pounds
Package Size:6.1 x 0.58 x 0.58 inches

Aspect-Oriented Security Hardening of UML Design Models by Springer

Buy Now:
Aspect-Oriented Security Hardening of UML Design Models

Brand: Springer
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$109.00


Quantity:  

 


View More In Programming.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Springer, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


ean: 9783642057106, isbn: 3642057101,
Written for students, remote sensing specialists, researchers and SAR system designers, Processing of SAR Data shows how to produce quality SAR images. In particular, this practical reference presents new methods and algorithms concerning the interfe...

mpn: 21 black & white illustrations, 81 colou, ean: 9783642323157, isbn: 3642323154,
This volume is based on the reviewed and edited proceedings of the International Symposium on Spatial Data Handling 2012, held in Bonn. The 15th SDH brought together scholars and professionals from the international GIScience community to present the...

ean: 9781441924261, isbn: 1441924264,
This highly useful book contains methodology for the analysis of data that arise from multiscale processes. It brings together a number of recent developments and makes them accessible to a wider audience. Taking a Bayesian approach allows for full a...

ean: 9780335262588, isbn: 0335262589,
Presents a guide to the research process, covering such topics as descriptive statistics, correlation, t-tests, factor analysis, and multiple regression....

ean: 9780077221430, isbn: 0077221435,
Fundamentals of Digital Logic with VHDL Design teaches the basic design techniques for logic circuits. The text ptovides a clear and easily understandable discussion of logic circuit design without the use of unnecessary formalism. It emphasizes the ...

mpn: 9780133775983, ean: 9780133775983, isbn: 0133775984,
Programming the World Wide Web¿ is intended for undergraduate students who have completed a course in object-oriented programming. It also serves as an up-to-date reference for Web programming professionals. Programming the World Wide Web¿ prov...

ean: 9780124058767, isbn: 0124058760,
MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering ...

mpn: illustrations, ean: 9780534359645, isbn: 0534359647,
Authors Wayne Winston and Munirpallam Venkataramanan emphasize model-formulation and model-building skills as well as interpretation of computer software output. Focusing on deterministic models, this book is designed for the first half of an operati...

ean: 9781305882560, isbn: 1305882563,
MindTap Computing for Shellman/Vodnik's New Perspectives Microsoft Office 365 & Access 2016: Comprehensive is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course--to provide en...

mpn: 9780538745840, ean: 9780538745840, isbn: 0538745843,
This book covers the basics of PHP and MySQL along with introductions to advanced topics including object-oriented programming and how to build Web sites that incorporate authentication and security. After you complete this course, you will be able t...



Privacy Policy / Terms of Service
© 2018 - emslinux.com. All Rights Reserved.