Abstract
Security and Dependability (S&D) becomes a strong requirement even in resource constraint embedded systems (RCES). Many domains are not traditionally involved in this kind of issue and have to adapt theirs current processes.
RCES development with S&D requirements represents a complex task. On one hand, it is necessary to provide a solution which manages the cohabitation of different concerns (hardware, software, security specialists, etc). On the other hand, it is advantageous to assist S&D specialists by providing building blocks corresponding to their needs. Of course, guidelines will help them during all the application development life cycle.
A solution based on model driven engineering (MDE) and patterns seems promising in order to resolve this issue. MDE authorizes different businesses to work together with a higher usual abstraction level. Then, patterns can provide practical solutions to meet specific requirements. This paper presents a new pattern development techniques to be inserted in a MDE-based solution. The approach uses a model as its first structural citizen along the course of the development process of S&D patterns for trusted RCES applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Serenity, system engineering for security & dependability (2006), http://www.serenity-project.org
Le Guennec, A., Sunyé, G., Jézéquel, J.-M.: Precise Modeling of Design Patterns. In: Evans, A., Caskurlu, B., Selic, B. (eds.) UML 2000. LNCS, vol. 1939, pp. 482–496. Springer, Heidelberg (2000)
Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language. Center for Environmental Structure Series, vol. 2. Oxford University Press, New York (1977)
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1, 11–33 (2004)
Brown, A.W., Wallnau, K.C.: The current state of CBSE. IEEE Software 15(5), 37–46 (1998)
Ghosh, S., Kim, D.-K., France, R., Song, E.: A uml-based metamodeling language to specify design patterns. In: Patterns, Proc. Workshop Software Model Eng. (WiSME) with Unified Modeling Language Conf. 2004 (2004)
Grundy, J., Mapelsden, D., Hosking, J.: Design pattern modelling and instantiation using dpml. In: CRPIT 2002: Proceedings of the Fortieth International Conference on Tools Pacific, pp. 3–11. Australian Computer Society, Inc. (2002)
Daniels, F.: The reliable hybrid pattern: A generalized software fault tolerant design pattern. In: PLOP 1997 (1997)
Douglass, B.P.: Real-time UML: Developing Efficient Objects for Embedded Systems. Addison-Wesley (1998)
Gasparis, E., Nicholson, J., Eden, A.H.: LePUS3: An Object-Oriented Design Description Language. In: Stapleton, G., Howse, J., Lee, J. (eds.) Diagrams 2008. LNCS (LNAI), vol. 5223, pp. 364–367. Springer, Heidelberg (2008)
Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley (1995)
Di Giacomo, V., et al.: Using security and dependability patterns for reaction processes, pp. 315–319. IEEE Computer Society (2008)
Henzinger, T.A.: Two challenges in embedded systems design: Predictability and robustness. Philosophical Transactions of the Royal Society A 366, 3727–3736 (2008)
Jürjens, J.: Umlsec: Extending uml for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)
Kopetz, H.: The complexity challenge in embedded system design. In: ISORC, pp. 3–12 (2008)
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)
OMG. A uml profile for marte: Modeling and analysis of real-time embedded systems,beta 2 (June 2008), http://www.omgmarte.org/Documents/Specifications/08-06-09.pdf
Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. 3(3), 461–491 (2004)
Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003)
Serrano, D., Mana, A., Sotirious, A.-D.: Towards precise and certified security patterns. In: Proceedings of 2nd International Workshop on Secure Systems Methodologies Using Patterns (Spattern 2008), pp. 287–291. IEEE Computer Society (September 2008)
Tichy, M., et al.: Design of self-managing dependable systems with uml and fault tolerance patterns. In: WOSS 2004: Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, pp. 105–109. ACM (2004)
Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. In: Conference on Pattern Languages of Programs, PLoP 1997 (1998)
Yoshioka, N., Washizaki, H., Maruyama, K.: A survey of security patterns. Progress in Informatics, 35–47 (2008)
Zurawski, R.: Embedded systems. In: Embedded Systems Handbook. CRC Press Inc. (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desnos, N., Hamid, B., Percebois, C., Gouteux, D. (2012). Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded Systems. In: Biffl, S., Winkler, D., Bergsmann, J. (eds) Software Quality. Process Automation in Software Development. SWQD 2012. Lecture Notes in Business Information Processing, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27213-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-27213-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27212-7
Online ISBN: 978-3-642-27213-4
eBook Packages: Computer ScienceComputer Science (R0)