skip to main content
10.1145/3543712.3543726acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicctaConference Proceedingsconference-collections
research-article

Aspect-Oriented Models-Based Framework to Secure Intelligent Systems

Authors Info & Claims
Published:20 September 2022Publication History

ABSTRACT

Security is a high-priority issue for any software system. Emerging intelligent systems have unique security challenges that need to be addressed. In this paper, we propose a novel aspect-oriented models-based security framework to address security concerns in intelligent systems. The aspects of this framework derive from identified threats to intelligent systems. We use Unified Modeling Language (UML) diagrams to present each aspect.

References

  1. Hessa A. Alhamad and Mohammad M. Hassan. 2022. Investigating Security Challenges of Emerging Intelligent Software Systems. (Under Review).Google ScholarGoogle Scholar
  2. Gregor Kiczales, John Lamping, Anurag Mendhekar, Chris Maeda, Cristina Lopes, Jean-Marc Loingtier, and John Irwin. 1997. Aspect-oriented programming. In Proceedings of the European Conference on Object-oriented Programming. Springer, Berlin, Heidelberg, 220–242.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ian Sommerville. 1977. Software engineering.Google ScholarGoogle Scholar
  4. Johan Brichau, Ruzanna Chitchyan, Awais Rashid, and Theo D'Hond. 2008. Aspect-oriented software development: an introduction Wiley Encyclopedia of Computer Science and Engineering.Google ScholarGoogle Scholar
  5. Abid Mehmood and Dayang N.A. Jawawi. 2013. Aspect-Oriented Modeling Approaches and Aspect Code Generation. International Review on Computers and Software (IRECOS). Vol. 8. 983-995.Google ScholarGoogle Scholar
  6. Omar Aldawud, Tzilla Elrad and Atef Bader. 2003. UML Profile for Aspect-Oriented Software Development. In Proceedings of the 3rd International Workshop on Aspect Oriented Modeling.Google ScholarGoogle Scholar
  7. Object Management Group. 2022. Unified Modeling Language. Retrieved January 25, 2022 from https://www.omg.org/spec/UML/2.5.1/About-UML/Google ScholarGoogle Scholar
  8. Gregor Engels, Reiko Heckel, and Stefan Saue. 2000. UML – A Universal Modeling Language? In International Conference on Application and Theory of Petri Nets. Springer, Berlin, Heidelberg, 24–38.Google ScholarGoogle ScholarCross RefCross Ref
  9. Ruzanna Chitchyan, A. Rashid, P. Sawyer, A. Garcia, M. P. Alarcon, J. Bakker, B. Tekinerdogan, S. Clarke, and A. Jackson. 2015. Survey of Aspect-Oriented Analysis and Design Approaches. Retrieved January 25, 2022 from https://hdl.handle.net/2381/32112.Google ScholarGoogle Scholar
  10. Aws Magableh, Zarina Shukur, and Noorazean Mohd Ali. 2013. Systematic review on aspect-oriented UML modeling: A complete aspectual UML modeling framework. Journal of Applied Sciences (Faisalabad). 13. no. 1.Google ScholarGoogle Scholar
  11. osh Dehlinger and Nalin V. Subramanian. 2006. Architecting Secure Software Systems Using an Aspect-Oriented Approach:: A Survey of Current Research. Iowa State University. Technical report.Google ScholarGoogle Scholar
  12. Dianxiang Xu and Kendall Nygard. 2005. A threat-driven approach to modeling and verifying secure software. In Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering (ASE '05). Association for Computing Machinery, New York, NY, USA, 342–346.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dianxiang Xu, Vivek Goel, Kendall E. Nygard, and W.Eric Wong. 2008. Aspect-oriented specification of threat-driven security requirements. International Journal of Computer Applications in Technology 31, no 1/2 (2008). 131-140.Google ScholarGoogle Scholar
  14. Geri Georg, Robert France and Indrakshi Ray. 2002. An Aspect-Based Approach to Modeling Security Concerns. In Proceedings of the Workshop on Critical Systems Development with UML. Dresden, Germany. 107–120.Google ScholarGoogle Scholar
  15. Geri Georg, Indrakshi Ray, and Robert France. 2002. Using aspects to design a secure system. In Eighth IEEE International Conference on Engineering of Complex Computer Systems. Proceedings. IEEE.Google ScholarGoogle Scholar
  16. Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee and Siv Hilde Houmb. 2009. An aspect-oriented methodology for designing secure applications. Information and Software Technology. Vol. 51. no. 5. 846–864.Google ScholarGoogle Scholar
  17. Zhi Jian Zhu and Mohammad Zulkernine. 2009. A model-based aspect-oriented framework for building intrusion-aware software systems. Information and Software Technology. Vol. 51. no. 5. 865–875.Google ScholarGoogle Scholar
  18. Hassan El-Hadary and Sherif El-Kassas. 2014. Capturing security requirements for software systems. Journal of advanced research. Vol. 5. no. 4. 463-472.Google ScholarGoogle ScholarCross RefCross Ref
  1. Aspect-Oriented Models-Based Framework to Secure Intelligent Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCTA '22: Proceedings of the 2022 8th International Conference on Computer Technology Applications
      May 2022
      286 pages
      ISBN:9781450396226
      DOI:10.1145/3543712

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 September 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format