Model-driven information flow security engineering for cyber-physical systems / Christopher Gerking ; Referees: Prof. Dr. Eric Bodden, Prof. Dr. Ralf H. Reussner. Paderborn, 2020
Content
- Abstract
- Zusammenfassung
- Danksagung
- Contents
- 1 Introduction
- 1.1 Information Flow Security
- 1.2 Running Example
- 1.3 Problem Statement
- 1.4 Scientific Contribution
- 1.5 Outline
- 2 Foundations
- 2.1 Model-Driven Engineering
- 2.2 Model-Based Systems Engineering with Consens
- 2.3 Model-Driven Software Engineering with MechatronicUML
- 2.4 Information Flow Security
- 3 Specification of Security Policies in Model-Based Systems Engineering
- 3.1 Scientific Contributions
- 3.2 Quality Factors
- 3.3 Overview
- 3.4 Documentation of Policies
- 3.5 Validation of Refined Policies
- 3.6 Quality Assessment
- 3.7 Limitations
- 3.8 Related Work
- 3.8.1 Information Flow in Model-Driven Security Requirements Engineering
- 3.8.2 Security in Model-Based Systems Engineering
- 3.9 Summary
- 4 Architectural Refinement of Component-Based Security Policies
- 4.1 Scientific Contributions
- 4.2 Requirements
- 4.3 Overview
- 4.4 Component-Based Security Policies
- 4.5 Policy Derivation
- 4.6 Well-Formedness of Refinements
- 4.7 Composability
- 4.8 Limitations
- 4.9 Related Work
- 4.9.1 Security for Component Architectures of Cyber-Physical Systems
- 4.9.2 Information Flow Security in Component-Based Software Engineering
- 4.9.3 Compositional Information Flow Security for Cyber-Physical Systems
- 4.10 Summary
- 5 A Verification Technique for Real-Time Information Flow Security
- 5.1 Scientific Contributions
- 5.2 Requirements
- 5.3 Overview
- 5.4 General Verification Approach
- 5.5 Automata Construction
- 5.6 Case Study
- 5.7 Limitations
- 5.8 Related Work
- 5.8.1 General Verification Techniques for Information Flow Security
- 5.8.2 Timing-Sensitive Information Flow Security
- 5.9 Summary
- 6 Imperative Refinement of Declarative Model Transformations
- 6.1 Scientific Contributions
- 6.2 Overview
- 6.3 Mapping Models
- 6.4 Inference Engine
- 6.5 Execution Framework
- 6.6 Case Studies
- 6.7 Limitations
- 6.8 Related Work
- 6.9 Summary
- 7 Conclusion
- A CoCoME Security Policies
- B Implemented Execution Framework
- Publications and Contributions
- Bibliography
