MARC details
000 -LEADER |
fixed length control field |
04670nam a22005055i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231104114333.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150410s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319161068 |
Canceled/invalid ISBN |
978-3-319-16106-8 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-319-16106-8 |
Source of number or code |
doi |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
TR-AnTOB |
Language of cataloging |
eng |
Transcribing agency |
TR-AnTOB |
Description conventions |
rda |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.758 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UMZ |
Source |
bicssc |
|
Subject category code |
COM051230 |
Source |
bisacsh |
|
Subject category code |
UMZ |
Source |
thema005.1 |
-- |
23 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mouheb, Djedjiga. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
Aspect-Oriented Security Hardening of UML Design Models / |
Statement of responsibility, etc. |
by Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham : |
Name of producer, publisher, distributor, manufacturer |
Springer International Publishing : |
-- |
Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1 Introduction -- 2 Unified Modeling Language -- 3 Aspect-Oriented Paradigm -- 4 Model-Driven Architecture and Model Transformations -- 5 Model-Based Security -- 6 Security Aspect Specification -- 7 Security Aspect Weaving -- 8 Static Matching and Weaving Semantics in Activity Diagrams -- 9 Dynamic Matching and Weaving Semantics in k-Calculus -- 10 Dynamic Matching and Weaving Semantics in Executable UML -- 11 Conclusion. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Software engineering. |
|
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Software Engineering. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I14029 |
|
Topical term or geographic name entry element |
Systems and Data Security. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28060 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Debbabi, Mourad. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Pourzandi, Makan. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Wang, Lingyu. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Nouh, Mariam. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Ziarati, Raha. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Alhadidi, Dima. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Talhi, Chamseddine. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
|
Personal name |
Lima, Vitor. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Springer eBooks |
Public note |
Online access link to the resource |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-319-16106-8">https://doi.org/10.1007/978-3-319-16106-8</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
E-Book |