请输入您要查询的百科知识:

 

词条 UMLsec
释义

  1. Development

  2. Profile definition

  3. Adversary model

  4. References

UMLsec is an extension to the Unified Modelling Language for integrating security related information in UML specifications. This information can be used for model based security engineering. Most security information is added using stereotypes and cover many security properties including secure information flow, confidentiality and access control. Using an attacker model these properties can be checked on a model level.

Development

It was first proposed by Jürjens et al. in 2002[1] and later revised and extended by the same author.[2]

Profile definition

UMLsec is defined as lightweight extension for UML.[3]

The profile is defined through a set of prototypes with properties (tag definitions) and constraints. UMLsec defines 21 stereotypes listed below.

Stereotype Base class Tags Description
fair exchange subsystem start, stop, adversary enforce the fair exchange principle on communication. That is, ensure no cheating of cooperating parties.
provable subsystem action, cert, adversary provide evidence of activities to obtain non-repudiation.
rbac subsystem protected, role, right enforce role-based access control.
Internet
link Internet connection. It is assumed to be susceptible to message deletion, addition and content exposure by the default attacker.
encrypted link model an encrypted connection. It is assumed to be susceptible to message deletion by the default attackers.
LAN link, node LAN connection or a LAN network (node).It is assumed to be unaffected by the default external attacker.
wirelinkwire connection. It is assumed to be unaffected by the default external attacker.
smart card
POS device
issuer node
nodeNodes with varying protection mechanisms. Adversary definitions determine to what extent these nodes may be tampered with. They are assumed to be unaffected by the default external attacker.
secrecy
integrity
high
dependencydependency that indicates an assumption of secrecy and integrity as well as high sensitivity .
criticalobject
subsystem
secrecy,
integrity,
authenticity,
high, fresh
label a system or object as critical. Tags are used to define in what respect the system/object is critical.
secure linkssubsystemadversaryenforce secure communication links under the defined adversary model.
secure dependenciessubsystemensure that secure dependencies are met.
data securitysubsystemadversary,
integrity,
authenticity
enforce basic security requirements under the defined adversary model.
no down-flow,
no up-flow
subsystemensure secure information flow.
guarded accesssubsystemensure that guarded objects are accessed only through their guards.
guardedobjectguardspecify a guarded object that can only be accessed through the object specified by the guard tag.

Adversary model

To ensure security it is necessary to specify what kind of attacker is assumed. In UMLsec, the attacker model is defined through the threats that it poses. The table below defines the default adversary. Other adversaries may of course be defined.

Stereotype Threatsdefault()
Internet {delete, read, insert}
encrypted {delete}
LAN
wire
smart card
POS device
issuer node

References

1. ^Jürjens, J. UMLsec: Extending UML for secure systems development. UML 2002 —The Unified Modeling Language (2002), 1–9.
2. ^Jürjens, J. Secure Systems Development with UML, 1 ed. Springer, 2005.
3. ^OMG. Unified Modeling Language Superstructure version 2.2. The Object Management Group, February 2009. http://www.omg.org/spec/UML/2.2/Superstructure

1 : Unified Modeling Language

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/30 20:31:10