Model-based security engineering for cyber-physical systems: A systematic mapping study

PH Nguyen, S Ali, T Yue - Information and Software Technology, 2017 - Elsevier
Abstract Context Cyber-physical systems (CPSs) have emerged to be the next generation of
engineered systems driving the so-called fourth industrial revolution. CPSs are becoming …

An extensive systematic review on the model-driven development of secure systems

PH Nguyen, M Kramer, J Klein, Y Le Traon - Information and Software …, 2015 - Elsevier
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …

[HTML][HTML] Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support

Q Rouland, B Hamid, J Jaskolka - Journal of Systems Architecture, 2021 - Elsevier
The existence of security threats in software designs can significantly impact the safe and
reliable operation of systems. Threats need to be precisely specified before a tool can …

Design notations for secure software: a systematic literature review

A Van den Berghe, R Scandariato, K Yskout… - Software & Systems …, 2017 - Springer
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …

Migrating monoliths to microservices-based customizable multi-tenant cloud-native apps

SG Haugeland, PH Nguyen, H Song… - 2021 47th Euromicro …, 2021 - ieeexplore.ieee.org
It was common that software vendors sell licenses to their clients to use software products,
such as Enterprise Resource Planning, which are deployed as a monolithic entity on clients' …

ASE: A comprehensive pattern-driven security methodology for distributed systems

AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …

Engineering secure systems: Models, patterns and empirical validation

B Hamid, D Weber - Computers & Security, 2018 - Elsevier
Several development approaches have been proposed to handle the growing complexity of
software system design. The most popular methods use models as the main artifacts to …

[HTML][HTML] Security policies by design in NoSQL document databases

C Blanco, D García-Saiz, DG Rosado… - Journal of Information …, 2022 - Elsevier
The importance of data security is currently increasing owing to the number of data
transactions that are continuously taking place. Large amounts of data are generated …

Security patterns modeling and formalization for pattern-based development of secure software systems

B Hamid, S Gürgens, A Fuchs - Innovations in Systems and Software …, 2016 - Springer
Pattern-based development of software systems has gained more attention recently by
addressing new challenges such as security and dependability. However, there are still …

A review on security requirements specification by formal methods

AD Mishra, K Mustafa - Concurrency and Computation …, 2022 - Wiley Online Library
Security is an afterthought process for the development of software in earlier days but now
the time has been changed. Now, security is on top priority and involved from the beginning …