Using Model-Based Engineering and Architectural Models to Build Secure Systems
May 2008 • White Paper
In this paper, the authors present analytical techniques to model and validate security protocols for enforcing confidentiality and integrity.
Software Engineering Institute
A system designer faces several challenges when specifying security for distributed computing environments or migrating systems to a new execution platform. Business stakeholders impose constraints due to cost, time-to- market requirements, productivity impact, customer satisfaction concerns, and the like. And users exercise power at the desktop over computing resources and data availability. So, a system designer needs to understand requirements regarding protected resources (e.g., data), confidentiality, and integrity. And, a designer needs to predict the effect that security measures will have on other runtime quality attributes such as resource consumption, availability, and real-time performance.