41,90 €
Statt 59,90 €**
41,90 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
payback
0 °P sammeln
41,90 €
Statt 59,90 €**
41,90 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
Statt 59,90 €****
41,90 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
Statt 59,90 €****
41,90 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: PDF

Engineering secure systems is an error-prone process, where any decision margin potentially favors critical implementation faults. To this end, formal security models serve as an abstract basis for verifying security properties. Unfortunately, the potential for human error in engineering and analyzing such models is still considerable. This work seeks to mitigate this problem. We identified semantic gaps between security requirements, informal security policies, and security models as a major source of error. Our goal is then based on this observation: to support error-minimizing design…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 1.3MB
  • FamilySharing(5)
Produktbeschreibung
Engineering secure systems is an error-prone process, where any decision margin potentially favors critical implementation faults. To this end, formal security models serve as an abstract basis for verifying security properties. Unfortunately, the potential for human error in engineering and analyzing such models is still considerable. This work seeks to mitigate this problem. We identified semantic gaps between security requirements, informal security policies, and security models as a major source of error. Our goal is then based on this observation: to support error-minimizing design decisions by bridging such gaps. Due to the broad range of security-critical application domains, no single modeling framework may achieve this. We therefore adopt the idea of aspect-oriented software development to tailor the formal part of a security engineering process towards security requirements of the system. Our method, termed aspect-oriented security engineering, is based on the idea of keeping each step in this process well-defined, small, and monotonic in terms of the degree of formalism. Our practical results focus on two use cases: first, model engineering for operating systems and middleware security policies; second, model analysis of runtime properties related to potential privilege escalation. We eventually combine both use cases to present a model-based reengineering approach for the access control system of Security-Enhanced Linux (SELinux).

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Peter Amthor ist promovierter Informatiker, er forscht und lehrt am Fachgebiet Verteilte Systeme und Betriebssysteme der Technischen Universität Ilmenau. Seine wissenschaftlichen Veröffentlichungen auf dem Gebiet sicherer IT-Systeme verfolgen das Ziel, formale Methoden für deren Entwurf, Analyse, Spezifikation und Implementierung einem breiten Spektrum von Anwendungen zugänglicher zu machen. Er unterrichtet Kurse in Betriebssystemen, verteilten Systemen, Systemsicherheit und modellbasiertem Security Engineering. Peter Amthor holds a PhD in Computer Science. He works as a postdoctoral researcher in the Distributed Systems and Operating Systems group at Ilmenau University of Technology (Technische Universität Ilmenau), Germany. His publication work focuses on formal foundations of secure IT systems, with the aim of making formal methods for their design, analysis, specification, and implementation more accessible to a broad range of applications. He teaches courses in operating systems, distributed systems, systems security and model-based security engineering.