[PDF][PDF] Toward modeling trust cyber-physical systems: A model-based system engineering method

Z Oudina, M Derdour - International Journal of Advanced …, 2023 - researchgate.net
… In this work, we examine specific strategies, models, and tools that encompass design …
used methods. The MBSE method consists of the SysML/UML-based profile, trust requirements …

[HTML][HTML] A model-driven approach to ensure trust in the IoT

D Ferraris, C Fernandez-Gago, J Lopez - Human-centric Computing and …, 2020 - Springer
… Indeed, if we consider trust through the whole SDLC, this approach could give important rules
of … In this case, to model trust, we consider decision model rules and also in this case the …

A Method to Ensure Compliance with Attribute and Role Based Access Control Policy for Executing BPMN Models

DH Nguyen, VV Le, TH Nguyen… - … Conference on System …, 2021 - ieeexplore.ieee.org
… business rules could be captured and checked. We build a support tool by incorporating
Activiti (the support tool for specifying and implementing BPMN models) with USE (UML-based

How consistency is handled in model-driven software engineering and UML: an expert opinion survey

D Torre, M Genero, Y Labiche, M Elaasar - Software Quality Journal, 2023 - Springer
… of consistency rules (Torre et al., 2018), we discuss this systematic process in detail, since
… experience in UML-based software engineering, we believe that through this procedure we …

IoTsecM: a UML/SysML extension for internet of things security modeling

PJ Escamilla-Ambrosio, DA Robles-Ramírez… - Ieee …, 2021 - ieeexplore.ieee.org
… The AUTHZ element refers to access control decisions based on access control policies. …
UML4IoT—A UML-based approach to exploit IoT in cyber-physical manufacturing systems. …

A model specification for the design of trust negotiations

M Kolar, C Fernandez-Gago, J Lopez - Computers & Security, 2019 - Elsevier
… We will use a UML-based notation to outline its concepts as the UML … -aware and multi-service
trust management system for the … control policies, purpose policies and optionally privacy …

A systematic review and analytical evaluation of security requirements engineering approaches

MN Anwar Mohammad, M Nazir, K Mustafa - Arabian Journal for Science …, 2019 - Springer
… It integrates role-based access control (RBAC) policies in … UML-based category’ have
recorded a second most high frequency of publication which confirms our finding that UML-based

Trust Negotiation Framework: Guidance for Developers

M Kolar - 2022 - riuma.uma.es
… potentially suitable policy languages for trust negotiation and … Then, we propose a UML-based
specification for modelling trust … The aim is to support trust negotiation in a general way, so …

[HTML][HTML] A domain-specific language for the specification of UCON policies

AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
… In other words, our approach aims at providing MDE tools to implement the original UCON.
Additionally, our approach covers not only the specification of UCON access control rules but …

Visual Privacy Management

M Pavlidis, H Mouratidis - … Management: Design and Applications …, 2020 - books.google.com
… Security policy 1 specifies that the … policy is verified in the business process specified in Fig.
3, since the security annotation in the business process matches the one in the security policy