iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-642-04947-7_16
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application | SpringerLink
Skip to main content

Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application

  • Conference paper
Advances in Conceptual Modeling - Challenging Perspectives (ER 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5833))

Included in the following conference series:

Abstract

Systems based on Grid computing have not traditionally been developed through suitable methodologies and have not taken into account security requirements throughout their development, offering technical security solutions only during the implementation stages. We are creating a development methodology for the construction of information systems based on Grid Computing, which is highly dependent on mobile devices, in which security plays a highly important role. One of the activities in this methodology is the requirements analysis which is use-case driven. In this paper, we build use case diagrams for a real mobile Grid application by using a UML-extension, called GridUCSec-Profile, through which it is possible to represent specific mobile Grid features and security aspects for use case diagrams, thus obtaining diagrams for secure mobile Grid environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bass, L., Bachmann, F., Ellison, R.J., Moore, A.P., Klein, M.: Security and survivability reasoning frameworks and architectural design tactics. SEI (2004)

    Google Scholar 

  2. Breu, R., Burger, K., Hafner, M., Jürjens, J., Popp, G., Lotz, V., Wimmel, G.: Key issues of a formally based process model for security engineering. In: International Conference on Software and Systems Engineering and their Applications (2003)

    Google Scholar 

  3. Haley, C.B., Moffet, J.D., Laney, R., Nuseibeh, B.: A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop, Shangai, China, pp. 35–42 (2006)

    Google Scholar 

  4. Jürjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  5. Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Advances and Future Vision. IGI Global (2006)

    Google Scholar 

  6. Foster, I., Kesselman, C.: The Grid2: Blueprint for a Future Computing Infrastructure, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2004)

    Google Scholar 

  7. Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: Engineering Process Based On Grid Use Cases For Mobile Grid Systems. In: The Third International Conference on Software and Data Technologies- ICSOFT 2008, Porto, Portugal, pp. 146–151 (2008)

    Google Scholar 

  8. Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices. In: International Conference on Availability, Reliability and Security (ARES 2008). IEEE Computer Society, Barcelona (2008)

    Google Scholar 

  9. The Object Management Group (OMG): OMG Unified Modeling Language (OMG UML), Version 2.2 (2007), http://www.omg.org/spec/UML/2.1.2/Infrastructure/PDF/

  10. Alexander, I., Maiden, N.: Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle. John Wiley & Sons, Chichester (2004)

    Google Scholar 

  11. Sindre, G., Opdahl, A.L.: Templates for misuse case description. In: 7th International Workshop on Requirements Engineering: Foundation for Software Quality, Austria (2001)

    Google Scholar 

  12. Sindre, G., Opdahl, A.L.: Capturing Security Requirements by Misuse Cases. In: 14th Norwegian Informatics Conference (NIK 2001), Tromsø, Norway (2001)

    Google Scholar 

  13. Alexander, I.: Misuse Cases: Use Cases with Hostile Intent. IEEE Software, 58–66 (2003)

    Google Scholar 

  14. Firesmith, D.G.: Security Use Cases. Journal of Object Technology, 53–64 (2003)

    Google Scholar 

  15. Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering Journal 10, 34–44 (2005)

    Article  Google Scholar 

  16. Rosado, D.G., Fernández-Medina, E., López, J.: Obtaining Security Requirements for a Mobile Grid System. International Journal of Grid and High Performance Computing (2009) (to be published in April 1, 2009)

    Google Scholar 

  17. Rosado, D.G., Fernández-Medina, E., López, J.: Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros. XIV Jornadas de Ingeniería del Software y Bases de Datos - JISBD 2009, San Sebastián (2009)

    Google Scholar 

  18. Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: Towards an UML Extension of Reusable Secure Use Cases for Mobile Grid systems. IEICE Transactions on Information and Systems (2009) (submitted)

    Google Scholar 

  19. Rosado, D.G., Fernández-Medina, E., López, J.: Reusable Security Use Cases for Mobile Grid environments. In: Workshop on Software Engineering for Secure Systems, in conjunction with the 31st International Conference on Software Engineering, Vancouver, Canada, pp. 1–8 (2009)

    Google Scholar 

  20. OMG: OMG Unified Modeling Language (OMG UML), Superstructure, V2.1.2 (2007), http://www.omg.org/spec/UML/2.1.2/Infrastructure/PDF/

  21. Røstad, L.: An extended misuse case notation: Including vulnerabilities and the insider threat. In: XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rosado, D.G., Fernández-Medina, E., López, J. (2009). Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application. In: Heuser, C.A., Pernul, G. (eds) Advances in Conceptual Modeling - Challenging Perspectives. ER 2009. Lecture Notes in Computer Science, vol 5833. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04947-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04947-7_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04946-0

  • Online ISBN: 978-3-642-04947-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics