SlideShare a Scribd company logo
UMLassure: A UML profile to model security requirements in software systems Presented by Manish Thaper(2007068) Supervised by Prof. ChandrashekarRamanathan International Institute of Information Technology, Bangalore
Welcome HARDWARE SOFTWARE EVERYWARE++ ++ http://designmind.frogdesign.com/events/software-hardware-everyware.html
So are …..
Whatever ! the Information flow must continue.
Hence a business case to…. Furthermore, the need for an expert software solution provider will never die.
Thesis background
A software solution….  …is composed of [2] Functional requirement (FR) A software should increase information availability Non-functional requirement (NFR) Security, reliability, performance, usability
Software development phases. Thesis focused at transition from Design to Construction
Problem Statement Software fraternity has long been attempting an improved translation of requirements and design artifacts into construction and deployment phases.  A successful examples exists on automating translation of functional requirements. Our research is on devising an approach to automate translation of the forgotten non-functional requirements from artifacts into construction.
Literature survey “If I have seen further it is by standing on the shoulders of giants.”			    Newton - 1675
Literature survey Goal requirement languages[23] Threat modeling[11] Misuse Case [5] cited in [19] Control Case[14] UMLsec [15, 16, 17] UMLintr [12], other citations [18, 21] Using uml to reflect nonfunctional Requirements [2] (using LEL)
Proposed approach“UMLassure” – A UML profile
UMLassure: helps in modeling… Software System Figure1 Actions, Actors and Assets [4] UMLassure[20] aid in modeling secure Actions.  Related work focused on modeling Actors and Assets
UMLassurecontinued… UML ,[object Object]
Benefits of UMLassure
Code comments, alerts – Helps developers, testers
A controlled access to expensive Assets by Actors through secure Actions
Potential applications of UMLassure
Higher translation from model to code
Plugs into an OMG MDA approach,[object Object]
Software implementation
Results – UML profile Stereotype <STEREOTYPE> <NAME>xss</NAME> <DESCRIPTION> To check ’cross-site scripting’ </DESCRIPTION> <BASECLASSES> <BASECLASS>UMLClass</BASECLASS> </BASECLASSES> </STEREOTYPE> Tagged value <TAGDEFINITIONSET> <NAME>xss</NAME> <BASECLASSES> <BASECLASS>UMLAttribute</BASECLASS> </BASECLASSES> <TAGDEFINITIONLIST> <TAGDEFINITION> <NAME>AttributeName</NAME> <TAGTYPE>String</TAGTYPE> </TAGDEFINITION>
Results – XML stylesheet (XSLT) XSLT sample file <xsl:apply-templates select="//XMI.content"/> </body> </html> </xsl:template> <xsl:template match="XMI.content"> <xsl:for-each select="UML:Model/UML:Namespace.ownedElement/UML:Model /UML:Namespace.ownedElement/UML:Class">
Results – XML stylesheet (XSLT) <xsl:value-of select="@visibility"/> <xsl:text disable-output-escaping="yes">   class  </xsl:text> <xsl:value-of select="@name"/> <xsl:text disable-output-escaping="yes"> 			….. cntd
Results – Sample code representation public class Organization { // Here goes the class contents X.53 organizationName X.53 organizationURL public getOrganizationName ( ) { // Method code goes here } public getOrganizationURL ( ) { // Method code goes here
Results – Sample code representation } private setOrganizationName ( ) { // Method code goes here 			…. cntd
Conclusion Non-functional requirements are critical for successful software development Static analysis tools remove bugs in software However, more efforts are required to minimize the design flaws
Conclusion – mitigating design flaws ,[object Object]
Purely mathematical modeling languages are not well understood by ALLstakeholders without sufficient mathematical backgroundUML profile provides an extension to UML at meta-model level UML profile being specific to a platform, provides higher model to codetranslation
Limitations Number of security threats run into hundreds This work demonstrated using four only. Security threats are tightly coupled to software under development Two out of four threats considered in this thesis are applicable to web applications only.  At this stage approach may be too naïve yet it’s a good beginning.
Future work This work demonstrates using class diagrams only… An extension over to behavioral diagram will be a necessary work in near future. Translations from design to construction phase discussed here can be improvised further.  Extend this work to augment construction and deployment phases.
Image references World map http://onearth.jpl.nasa.gov/examples/wms_gm_r2.jpeg Bug http://i.zdnet.com/blogs/istock_000002369355xsmall.jpg Crimeware http://www.cigital.com/justiceleague/wp-content/uploads/2008/04/crimeware.jpg Telegraph http://www.thecanadianencyclopedia.com/featuremedia/feature137/TelegraphMachine.jpg

More Related Content

Viewers also liked (6)

A szamviteli torveny valtozasai 2016-ban
A szamviteli torveny valtozasai 2016-banA szamviteli torveny valtozasai 2016-ban
A szamviteli torveny valtozasai 2016-ban
 
Neska ikustezina td
Neska ikustezina tdNeska ikustezina td
Neska ikustezina td
 
Trabalho sobre depressão
Trabalho sobre depressãoTrabalho sobre depressão
Trabalho sobre depressão
 
Plastic Bags
Plastic BagsPlastic Bags
Plastic Bags
 
Expediente de evidencias de enseñanza
Expediente de evidencias de enseñanzaExpediente de evidencias de enseñanza
Expediente de evidencias de enseñanza
 
赵靖-第3课喜宴2-高级-20110222
赵靖-第3课喜宴2-高级-20110222赵靖-第3课喜宴2-高级-20110222
赵靖-第3课喜宴2-高级-20110222
 

Similar to UMLassure: An approach to model software security

Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software Architecture
Tiffany Graham
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
guru3188
 
Anton Zorin - cv
Anton Zorin - cvAnton Zorin - cv
Anton Zorin - cv
Anton Zorin
 

Similar to UMLassure: An approach to model software security (20)

Se research update
Se research updateSe research update
Se research update
 
Carol Harstad Research Proposal
Carol Harstad   Research ProposalCarol Harstad   Research Proposal
Carol Harstad Research Proposal
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
Rejunevating software reengineering processes
Rejunevating software reengineering processesRejunevating software reengineering processes
Rejunevating software reengineering processes
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software Architecture
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...
 
Unit iii(part b - architectural design)
Unit   iii(part b - architectural design)Unit   iii(part b - architectural design)
Unit iii(part b - architectural design)
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019
 
jChampions JSR381 Visual recognition for java
jChampions   JSR381 Visual recognition for javajChampions   JSR381 Visual recognition for java
jChampions JSR381 Visual recognition for java
 
Ch01lect1 et
Ch01lect1 etCh01lect1 et
Ch01lect1 et
 
Software Architecture: introduction to the abstraction
Software Architecture: introduction to the abstractionSoftware Architecture: introduction to the abstraction
Software Architecture: introduction to the abstraction
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure Visualizer
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Software Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionSoftware Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the Abstraction
 
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
 
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
 
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
 
Anton Zorin - cv
Anton Zorin - cvAnton Zorin - cv
Anton Zorin - cv
 
DECORATOR PATTERN IN WEB APPLICATION
DECORATOR PATTERN IN WEB APPLICATIONDECORATOR PATTERN IN WEB APPLICATION
DECORATOR PATTERN IN WEB APPLICATION
 

More from manishthaper (7)

Jazz - Collaborative Software Development
Jazz - Collaborative Software DevelopmentJazz - Collaborative Software Development
Jazz - Collaborative Software Development
 
Home care diagnostics system - Cntd
Home care diagnostics system - CntdHome care diagnostics system - Cntd
Home care diagnostics system - Cntd
 
Home care diagnostics system
Home care diagnostics systemHome care diagnostics system
Home care diagnostics system
 
Gudiya - Save her
Gudiya - Save herGudiya - Save her
Gudiya - Save her
 
Adam and Eve Condoms
Adam and Eve CondomsAdam and Eve Condoms
Adam and Eve Condoms
 
UML 2.0 Changes
UML 2.0 ChangesUML 2.0 Changes
UML 2.0 Changes
 
Transformation of work with Information Technology
Transformation of work with Information TechnologyTransformation of work with Information Technology
Transformation of work with Information Technology
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

UMLassure: An approach to model software security

  • 1. UMLassure: A UML profile to model security requirements in software systems Presented by Manish Thaper(2007068) Supervised by Prof. ChandrashekarRamanathan International Institute of Information Technology, Bangalore
  • 2. Welcome HARDWARE SOFTWARE EVERYWARE++ ++ http://designmind.frogdesign.com/events/software-hardware-everyware.html
  • 4. Whatever ! the Information flow must continue.
  • 5. Hence a business case to…. Furthermore, the need for an expert software solution provider will never die.
  • 7. A software solution…. …is composed of [2] Functional requirement (FR) A software should increase information availability Non-functional requirement (NFR) Security, reliability, performance, usability
  • 8. Software development phases. Thesis focused at transition from Design to Construction
  • 9. Problem Statement Software fraternity has long been attempting an improved translation of requirements and design artifacts into construction and deployment phases. A successful examples exists on automating translation of functional requirements. Our research is on devising an approach to automate translation of the forgotten non-functional requirements from artifacts into construction.
  • 10. Literature survey “If I have seen further it is by standing on the shoulders of giants.” Newton - 1675
  • 11. Literature survey Goal requirement languages[23] Threat modeling[11] Misuse Case [5] cited in [19] Control Case[14] UMLsec [15, 16, 17] UMLintr [12], other citations [18, 21] Using uml to reflect nonfunctional Requirements [2] (using LEL)
  • 13. UMLassure: helps in modeling… Software System Figure1 Actions, Actors and Assets [4] UMLassure[20] aid in modeling secure Actions. Related work focused on modeling Actors and Assets
  • 14.
  • 16. Code comments, alerts – Helps developers, testers
  • 17. A controlled access to expensive Assets by Actors through secure Actions
  • 19. Higher translation from model to code
  • 20.
  • 22. Results – UML profile Stereotype <STEREOTYPE> <NAME>xss</NAME> <DESCRIPTION> To check ’cross-site scripting’ </DESCRIPTION> <BASECLASSES> <BASECLASS>UMLClass</BASECLASS> </BASECLASSES> </STEREOTYPE> Tagged value <TAGDEFINITIONSET> <NAME>xss</NAME> <BASECLASSES> <BASECLASS>UMLAttribute</BASECLASS> </BASECLASSES> <TAGDEFINITIONLIST> <TAGDEFINITION> <NAME>AttributeName</NAME> <TAGTYPE>String</TAGTYPE> </TAGDEFINITION>
  • 23. Results – XML stylesheet (XSLT) XSLT sample file <xsl:apply-templates select="//XMI.content"/> </body> </html> </xsl:template> <xsl:template match="XMI.content"> <xsl:for-each select="UML:Model/UML:Namespace.ownedElement/UML:Model /UML:Namespace.ownedElement/UML:Class">
  • 24. Results – XML stylesheet (XSLT) <xsl:value-of select="@visibility"/> <xsl:text disable-output-escaping="yes">   class  </xsl:text> <xsl:value-of select="@name"/> <xsl:text disable-output-escaping="yes"> ….. cntd
  • 25. Results – Sample code representation public class Organization { // Here goes the class contents X.53 organizationName X.53 organizationURL public getOrganizationName ( ) { // Method code goes here } public getOrganizationURL ( ) { // Method code goes here
  • 26. Results – Sample code representation } private setOrganizationName ( ) { // Method code goes here …. cntd
  • 27. Conclusion Non-functional requirements are critical for successful software development Static analysis tools remove bugs in software However, more efforts are required to minimize the design flaws
  • 28.
  • 29. Purely mathematical modeling languages are not well understood by ALLstakeholders without sufficient mathematical backgroundUML profile provides an extension to UML at meta-model level UML profile being specific to a platform, provides higher model to codetranslation
  • 30. Limitations Number of security threats run into hundreds This work demonstrated using four only. Security threats are tightly coupled to software under development Two out of four threats considered in this thesis are applicable to web applications only. At this stage approach may be too naïve yet it’s a good beginning.
  • 31. Future work This work demonstrates using class diagrams only… An extension over to behavioral diagram will be a necessary work in near future. Translations from design to construction phase discussed here can be improvised further. Extend this work to augment construction and deployment phases.
  • 32. Image references World map http://onearth.jpl.nasa.gov/examples/wms_gm_r2.jpeg Bug http://i.zdnet.com/blogs/istock_000002369355xsmall.jpg Crimeware http://www.cigital.com/justiceleague/wp-content/uploads/2008/04/crimeware.jpg Telegraph http://www.thecanadianencyclopedia.com/featuremedia/feature137/TelegraphMachine.jpg
  • 33. Image references Apple iPhone http://noiseblogger.com/wp-content/uploads/2009/02/apple-iphone-keyboard.jpg Information rings http://www.future-gadgets.com/wp-content/uploads/2008/01/information-ring1.jpg Issac Newton http://www.linnaeus.uu.se/online/matematik/bilder/newton.jpg
  • 34. Literature references [1] Yu E. Chung L, Nixon B and Mylopoulos J., Non-functional requirements in software engineering, Kluwer Academic Publishers, 2000. [2] LuizMarcioCysneiros and Julio Cesar Sampaio do Prado Leite, Using uml to reflect nonfunctional requirements, Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research, Centre for Advanced Studies Toronto, November 05-07, 2001. [3] J. Doser D. Basin and T. Lodderstedt., Model driven security: From uml models to access control infrastructures., ACM Transactions on Software Engineering and Methodology. Vol.15, No. 1, January 2006, ACM, 2006, p. pp 3991. [4] Markus Schumacher et. al., Security patterns: integrating security and systems engineering, John Wiley and Sons, Ltd., 2006.
  • 35. Literature references [5] Sindre G. and Opdahl A.L., Eliciting security requirements by misuse cases, Proceedings of the TOOLS Pacific 2000, TOOLS Pacific, November 20-23, 2000, pp. pp 120–131. [6] Object Management Group, Model driven architecture., Object Management Group, 2002. [7] _________, Omgs official uml documentation site., Object Management Group, 2002. [8] _________, Omgsuml profile catalogue., Object Management Group, 2002. [9] _________, Uml profile for schedulability,performance and time, Object Management Group, 2002. [10] Kim Hamilton and Russel Miles, Learning uml 2.0, O’Reilly. [11] Michael Howard and David LeBlanc, Writing secure code, Microsoft Press, 2003. [12] Mohammed Hussein and Mohammad Zulkernine, Umlintr:auml profile for specifying intrusions, Proceedings of the 13th Annual IEEE International Symposium and Workshop on Engineering
  • 36. Literature references of Computer Based Systems (ECBS06), IEEE, 2006. [13] Leite J.C.S.P. and A.P.M. Franco, A strategy for conceptual model acquisition, Proceedings of the First IEEE International Symposium on Requirements Engineering, SanDiego, Ca, IEEE Computer Society Press, 1993, pp. pp 243–246. [14] Christopher J. Pavlovski. Joe Zou, Modeling architectural non functional requirements: From use case to control case, IEEE International Conference on eBusiness Engineering (ICEBE06), IEEE, 2006. [15] J. Jurjens, Towards development of secure systems using uml., In H. Hubmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International conference), Springer, Genova, Italy, 2001, p. pp 3991.
  • 37. Literature references [16] _________ , Using umlsec and goal trees for secure systems development, SAC 2002, Madrid, Spain, ACM, 2002. [17] _________ , Secure system development with uml, Springer-Verlag, 2005. [18] Axelsson S., Intrusion detection systems: A survey and taxonomy, Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000. [19] Asoke K. Talukder and Manish Chaitanya, Architecting secure software systems, Auerbach Publications, 2008. [20] Manish Thaper and ChandrashekarRamanathan, Umlassure: A uml profile assuring a secure software, Proceedings of the 2009 International Conference on Software Technology and
  • 38. Literature references Engineering ”to appear”, World Scientific Press, July 24-26, 2009. [21] Eckmann S.T. Vigna G and Kemmerer R.A., Attack languages, Proceedings of the IEEE Information Survivability Workshop, Boston, MA, IEEE, 2000. [22] ManoochAzmoodehXiaoqing (Frank) Liu and NektariosGeorgalas, Specification of nonfunctional requirements for contract specification in the ngoss framework for quality management and product evaluation, Fifth International Workshop on Software Quality, IEEE, 2007. [23] University of Toronto, Canada website - http://www.cs.toronto.edu/km/GRL/

Editor's Notes

  1. Tip: Add your own speaker notes here.