Reference Hub1
A Method for Model-Driven Information Flow Security

A Method for Model-Driven Information Flow Security

Fredrik Seehusen, Ketil Stølen
ISBN13: 9781609607470|ISBN10: 1609607473|EISBN13: 9781609607487
DOI: 10.4018/978-1-60960-747-0.ch010
Cite Chapter Cite Chapter

MLA

Seehusen, Fredrik, and Ketil Stølen. "A Method for Model-Driven Information Flow Security ." Dependability and Computer Engineering: Concepts for Software-Intensive Systems, edited by Luigia Petre, et al., IGI Global, 2012, pp. 199-229. https://doi.org/10.4018/978-1-60960-747-0.ch010

APA

Seehusen, F. & Stølen, K. (2012). A Method for Model-Driven Information Flow Security . In L. Petre, K. Sere, & E. Troubitsyna (Eds.), Dependability and Computer Engineering: Concepts for Software-Intensive Systems (pp. 199-229). IGI Global. https://doi.org/10.4018/978-1-60960-747-0.ch010

Chicago

Seehusen, Fredrik, and Ketil Stølen. "A Method for Model-Driven Information Flow Security ." In Dependability and Computer Engineering: Concepts for Software-Intensive Systems, edited by Luigia Petre, Kaisa Sere, and Elena Troubitsyna, 199-229. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-747-0.ch010

Export Reference

Mendeley
Favorite

Abstract

We present a method for software development in which information flow security is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the system architecture and selects a set of security requirements (in the form of secure information flow properties) that the system must adhere to. The user then specifies each component of the system architecture using UML inspired state machines, and refines/transforms these (abstract) state machines into concrete state machines. It is shown that if the abstract specification adheres to the security requirements, then so does the concrete one provided that certain conditions are satisfied.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.