de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
Schliessen
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Werk suchen
Model-driven information flow security engineering for cyber-physical systems / Christopher Gerking ; Referees: Prof. Dr. Eric Bodden, Prof. Dr. Ralf H. Reussner. Paderborn, 2020
Inhalt
Abstract
Zusammenfassung
Danksagung
Contents
1 Introduction
1.1 Information Flow Security
1.2 Running Example
1.3 Problem Statement
1.4 Scientific Contribution
1.5 Outline
2 Foundations
2.1 Model-Driven Engineering
2.1.1 Metamodeling
2.1.2 Model Transformation
2.2 Model-Based Systems Engineering with Consens
2.2.1 Environment
2.2.2 Active Structure
2.3 Model-Driven Software Engineering with MechatronicUML
2.3.1 Design Process
2.3.2 Component Model
2.3.3 Real-Time Behavior
2.4 Information Flow Security
2.4.1 Security Policies
2.4.2 Definitions of Security
3 Specification of Security Policies in Model-Based Systems Engineering
3.1 Scientific Contributions
3.2 Quality Factors
3.3 Overview
3.4 Documentation of Policies
3.5 Validation of Refined Policies
3.5.1 Refinement
3.5.2 Validity
3.6 Quality Assessment
3.6.1 Situational Criteria Profile
3.6.2 Methodology Model
3.6.3 Results
3.7 Limitations
3.8 Related Work
3.8.1 Information Flow in Model-Driven Security Requirements Engineering
3.8.2 Security in Model-Based Systems Engineering
3.9 Summary
4 Architectural Refinement of Component-Based Security Policies
4.1 Scientific Contributions
4.2 Requirements
4.3 Overview
4.4 Component-Based Security Policies
4.4.1 Example Policy
4.4.2 Limiting Factors
4.5 Policy Derivation
4.5.1 Derivation Rules
4.5.2 Example Derivation
4.5.3 Generalization
4.6 Well-Formedness of Refinements
4.6.1 Delegation
4.6.2 Assembly
4.6.3 Best Practices
4.6.4 Example Refinement
4.7 Composability
4.7.1 Defining Security
4.7.2 Preserving Security
4.8 Limitations
4.9 Related Work
4.9.1 Security for Component Architectures of Cyber-Physical Systems
4.9.2 Information Flow Security in Component-Based Software Engineering
4.9.3 Compositional Information Flow Security for Cyber-Physical Systems
4.10 Summary
5 A Verification Technique for Real-Time Information Flow Security
5.1 Scientific Contributions
5.2 Requirements
5.3 Overview
5.4 General Verification Approach
5.5 Automata Construction
5.5.1 Perturbed Automaton
5.5.2 Test Automaton
5.5.3 Adjusted Automaton
5.6 Case Study
5.6.1 Case Selection
5.6.2 Data Collection
5.6.3 Analysis
5.6.4 Results
5.6.5 Validity
5.7 Limitations
5.8 Related Work
5.8.1 General Verification Techniques for Information Flow Security
5.8.2 Timing-Sensitive Information Flow Security
5.9 Summary
6 Imperative Refinement of Declarative Model Transformations
6.1 Scientific Contributions
6.2 Overview
6.2.1 Problem Definition
6.2.2 Requirements
6.2.3 Solution Approach
6.3 Mapping Models
6.3.1 Type Mappings
6.3.2 Feature Mappings
6.4 Inference Engine
6.5 Execution Framework
6.5.1 Execution Algorithm
6.5.2 Imperative Refinement
6.5.3 Language Facilities
6.6 Case Studies
6.6.1 Case Selection
6.6.2 Data Collection
6.6.3 Analysis
6.6.4 Results
6.6.5 Validity
6.7 Limitations
6.8 Related Work
6.8.1 Mapping Models
6.8.2 Model Transformation Generation
6.9 Summary
7 Conclusion
7.1 Summary of Contributions
7.2 Future Perspectives
A CoCoME Security Policies
B Implemented Execution Framework
Publications and Contributions
Bibliography
Published Works
Supervised Theses
Scientific Literature
Standards
Die detaillierte Suchanfrage erfordert aktiviertes Javascript.