Skip to main content

Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded Systems

  • Conference paper
  • 991 Accesses

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 94))

Abstract

Security and Dependability (S&D) becomes a strong requirement even in resource constraint embedded systems (RCES). Many domains are not traditionally involved in this kind of issue and have to adapt theirs current processes.

RCES development with S&D requirements represents a complex task. On one hand, it is necessary to provide a solution which manages the cohabitation of different concerns (hardware, software, security specialists, etc). On the other hand, it is advantageous to assist S&D specialists by providing building blocks corresponding to their needs. Of course, guidelines will help them during all the application development life cycle.

A solution based on model driven engineering (MDE) and patterns seems promising in order to resolve this issue. MDE authorizes different businesses to work together with a higher usual abstraction level. Then, patterns can provide practical solutions to meet specific requirements. This paper presents a new pattern development techniques to be inserted in a MDE-based solution. The approach uses a model as its first structural citizen along the course of the development process of S&D patterns for trusted RCES applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Serenity, system engineering for security & dependability (2006), http://www.serenity-project.org

  2. Le Guennec, A., Sunyé, G., Jézéquel, J.-M.: Precise Modeling of Design Patterns. In: Evans, A., Caskurlu, B., Selic, B. (eds.) UML 2000. LNCS, vol. 1939, pp. 482–496. Springer, Heidelberg (2000)

    Google Scholar 

  3. Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language. Center for Environmental Structure Series, vol. 2. Oxford University Press, New York (1977)

    Google Scholar 

  4. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1, 11–33 (2004)

    Google Scholar 

  5. Brown, A.W., Wallnau, K.C.: The current state of CBSE. IEEE Software 15(5), 37–46 (1998)

    Google Scholar 

  6. Ghosh, S., Kim, D.-K., France, R., Song, E.: A uml-based metamodeling language to specify design patterns. In: Patterns, Proc. Workshop Software Model Eng. (WiSME) with Unified Modeling Language Conf. 2004 (2004)

    Google Scholar 

  7. Grundy, J., Mapelsden, D., Hosking, J.: Design pattern modelling and instantiation using dpml. In: CRPIT 2002: Proceedings of the Fortieth International Conference on Tools Pacific, pp. 3–11. Australian Computer Society, Inc. (2002)

    Google Scholar 

  8. Daniels, F.: The reliable hybrid pattern: A generalized software fault tolerant design pattern. In: PLOP 1997 (1997)

    Google Scholar 

  9. Douglass, B.P.: Real-time UML: Developing Efficient Objects for Embedded Systems. Addison-Wesley (1998)

    Google Scholar 

  10. Gasparis, E., Nicholson, J., Eden, A.H.: LePUS3: An Object-Oriented Design Description Language. In: Stapleton, G., Howse, J., Lee, J. (eds.) Diagrams 2008. LNCS (LNAI), vol. 5223, pp. 364–367. Springer, Heidelberg (2008)

    Google Scholar 

  11. Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley (1995)

    Google Scholar 

  12. Di Giacomo, V., et al.: Using security and dependability patterns for reaction processes, pp. 315–319. IEEE Computer Society (2008)

    Google Scholar 

  13. Henzinger, T.A.: Two challenges in embedded systems design: Predictability and robustness. Philosophical Transactions of the Royal Society A 366, 3727–3736 (2008)

    Google Scholar 

  14. Jürjens, J.: Umlsec: Extending uml for Secure Systems Development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412–425. Springer, Heidelberg (2002)

    Google Scholar 

  15. Kopetz, H.: The complexity challenge in embedded system design. In: ISORC, pp. 3–12 (2008)

    Google Scholar 

  16. Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)

    Google Scholar 

  17. OMG. A uml profile for marte: Modeling and analysis of real-time embedded systems,beta 2 (June 2008), http://www.omgmarte.org/Documents/Specifications/08-06-09.pdf

  18. Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. 3(3), 461–491 (2004)

    Google Scholar 

  19. Schumacher, M.: Security Engineering with Patterns. LNCS, vol. 2754. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  20. Serrano, D., Mana, A., Sotirious, A.-D.: Towards precise and certified security patterns. In: Proceedings of 2nd International Workshop on Secure Systems Methodologies Using Patterns (Spattern 2008), pp. 287–291. IEEE Computer Society (September 2008)

    Google Scholar 

  21. Tichy, M., et al.: Design of self-managing dependable systems with uml and fault tolerance patterns. In: WOSS 2004: Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, pp. 105–109. ACM (2004)

    Google Scholar 

  22. Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. In: Conference on Pattern Languages of Programs, PLoP 1997 (1998)

    Google Scholar 

  23. Yoshioka, N., Washizaki, H., Maruyama, K.: A survey of security patterns. Progress in Informatics, 35–47 (2008)

    Google Scholar 

  24. Zurawski, R.: Embedded systems. In: Embedded Systems Handbook. CRC Press Inc. (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Desnos, N., Hamid, B., Percebois, C., Gouteux, D. (2012). Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded Systems. In: Biffl, S., Winkler, D., Bergsmann, J. (eds) Software Quality. Process Automation in Software Development. SWQD 2012. Lecture Notes in Business Information Processing, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27213-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27213-4_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27212-7

  • Online ISBN: 978-3-642-27213-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics