skip to main content
10.1145/1368088.1368186acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Model-based security analysis for mobile communications

Published:10 May 2008Publication History

ABSTRACT

Mobile communication systems are increasingly used in companies. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such mobile communication systems. This work presents the experiences and results from the security analysis of a mobile system architecture at a large German telecommunications company, by making use of an approach to Model-based Security Engineering that is based on the UML extension UMLsec. The focus lies on the security mechanisms and security policies of the mobile applications which were analyzed using the UMLsec method and tools. Main results of the paper include a field report on the employment of the UMLsec method in an industrial telecommunications context as well as indications of its benefits and limitations.

References

  1. A. Apvrille and M. Pourzandi. Secure software development by example. IEEE Security & Privacy, 3(4):10--17, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Best, J. Jürjens, and B. Nuseibeh. Model-based security engineering of distributed information systems using UMLsec. In 29th International Conference on Software Engineering (ICSE 2007), pages 581--590. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Grünbauer, H. Hollmann, J. Jürjens, and G. Wimmel. Modelling and verification of layered security-protocols: A bank application. In SAFECOMP 2003, LNCS. Springer, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. J. Jürjens. Secure Systems Development with UML. Springer, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In 27th Int. Conf. on Softw. Engineering (ICSE 2005). IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Jürjens. Model-based security engineering for real. In 14th Intern. Symposium on Formal Methods (FM 2006), volume 4085 of LNCS, pages 600--606. Springer, 2006. Industry Day Invited Paper. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Jürjens. Security analysis of crypto-based Java programs using automated theorem provers. In S. Easterbrook and S. Uchitel, editors, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006). ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Jürjens and P. Shabalin. Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Perry, A. Porter, and L. Votta. Empirical studies of software engineering: a roadmap. In ICSE - Future of SE Track, pages 345--355, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Schalken. Research methods for the empirical assessment of software processes. In The 12th Doctoral Consortium at CAiSE 05, 2005.Google ScholarGoogle Scholar
  11. UMLsec tool, 2001-08. http://computing-research.open.ac.uk/jj/umlsectool.Google ScholarGoogle Scholar
  12. M. Vetterling, G. Wimmel, and A. Wisspeintner. Secure systems development based on the Common Criteria. In 10th International Symposium on the Foundations of Software Engineering (FSE-10), pages 129--138. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Model-based security analysis for mobile communications

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                ICSE '08: Proceedings of the 30th international conference on Software engineering
                May 2008
                558 pages
                ISBN:9781605580791
                DOI:10.1145/1368088

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 10 May 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                ICSE '08 Paper Acceptance Rate56of370submissions,15%Overall Acceptance Rate276of1,856submissions,15%

                Upcoming Conference

                ICSE 2025

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader