• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

面向方面的恶意序列编织模型中的认证威胁缓解的建模与验证。

Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model.

机构信息

Department of Computer Science and Information Technology, BRAINS Institute, Peshawar, Pakistan.

Faculty of Computing, Riphah International University, Islamabad, Pakistan.

出版信息

PLoS One. 2022 Jul 6;17(7):e0270702. doi: 10.1371/journal.pone.0270702. eCollection 2022.

DOI:10.1371/journal.pone.0270702
PMID:35793370
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9258847/
Abstract

The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the early stages of software engineering. Hence, there is a need to mitigate these threats at the design stage. Security threats, specifically authentication threats, crosscut other functional and non-functional requirements when modeled using the object-oriented paradigm. This not only makes the design complex but also results in tangling and scattering problems. We therefore model authentication threats using the aspect-oriented modeling (AOM) technique since it separates crosscutting concerns and localizes them as separate units called aspects. Our main research aim is to remove scattering and tangling in security threats modeling using all the core features of the aspect-oriented technique. In this paper, we propose a research approach to model security threats and their mitigation in mal sequence diagram. Using this approach, our contribution makes a clear difference from previous work. Our first contribution is the modeling of authentication threats in the mal sequence diagram using the security profile and AOM profile. Our second contribution is the mathematical verification of the aspect-oriented mal sequence woven model in terms of correctness and completeness. Using the proposed approach, the scattering and tangling from the resultant woven model are successfully removed at the design stage. Thus, the complexity of models and the time and effort required for future modifications of design models are reduced.

摘要

在软件工程的设计阶段,对安全威胁进行建模与对功能需求进行建模同样重要。然而,与功能需求建模不同的是,安全威胁建模往往被忽视,这导致软件在早期设计阶段就引入了缺陷。因此,需要在设计阶段减轻这些威胁。当使用面向对象的范例对安全威胁(特别是身份验证威胁)建模时,这些威胁会与其他功能和非功能需求交叉,这不仅使设计变得复杂,还会导致纠缠和分散的问题。因此,我们使用面向方面的建模 (AOM) 技术对身份验证威胁进行建模,因为它可以分离横切关注点,并将其本地化到称为方面的单独单元中。我们的主要研究目标是使用面向方面技术的所有核心功能消除安全威胁建模中的分散和纠缠问题。在本文中,我们提出了一种在恶意序列图中对安全威胁及其缓解进行建模的研究方法。使用这种方法,我们的贡献与之前的工作有明显的区别。我们的第一个贡献是使用安全配置文件和 AOM 配置文件在恶意序列图中对身份验证威胁进行建模。我们的第二个贡献是从正确性和完整性方面对面向方面的恶意序列编织模型进行数学验证。使用所提出的方法,可以在设计阶段成功消除从生成的编织模型中产生的分散和纠缠问题。因此,减少了模型的复杂性以及设计模型未来修改所需的时间和精力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/8c04ae1d85cc/pone.0270702.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/e7f1281f2c24/pone.0270702.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/dee0c953bf99/pone.0270702.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/e83d1d44a430/pone.0270702.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/eb783fcb4dba/pone.0270702.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/8c556cb37fe0/pone.0270702.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/313d89a1daef/pone.0270702.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/cf84354fbde2/pone.0270702.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/995d6e3c8d7e/pone.0270702.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/d16041927c9b/pone.0270702.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/66564959ebb7/pone.0270702.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/e494fb92c620/pone.0270702.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/daf898ad9455/pone.0270702.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/7908d450411e/pone.0270702.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/a4c14cb090e7/pone.0270702.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/912cb0bbc568/pone.0270702.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/8c04ae1d85cc/pone.0270702.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/e7f1281f2c24/pone.0270702.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/dee0c953bf99/pone.0270702.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/e83d1d44a430/pone.0270702.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/eb783fcb4dba/pone.0270702.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/8c556cb37fe0/pone.0270702.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/313d89a1daef/pone.0270702.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/cf84354fbde2/pone.0270702.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/995d6e3c8d7e/pone.0270702.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/d16041927c9b/pone.0270702.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/66564959ebb7/pone.0270702.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/e494fb92c620/pone.0270702.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/daf898ad9455/pone.0270702.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/7908d450411e/pone.0270702.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/a4c14cb090e7/pone.0270702.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/912cb0bbc568/pone.0270702.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5a84/9258847/8c04ae1d85cc/pone.0270702.g016.jpg

相似文献

1
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model.面向方面的恶意序列编织模型中的认证威胁缓解的建模与验证。
PLoS One. 2022 Jul 6;17(7):e0270702. doi: 10.1371/journal.pone.0270702. eCollection 2022.
2
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.使用时态逻辑对受限设备和低功耗广域网的声誉多因素认证机制进行形式化验证。
Sensors (Basel). 2023 Aug 3;23(15):6933. doi: 10.3390/s23156933.
3
An Efficient Identification of Security Threats in Requirement Engineering Methodology.一种在需求工程方法学中高效识别安全威胁的方法。
Comput Intell Neurosci. 2022 Aug 18;2022:1872079. doi: 10.1155/2022/1872079. eCollection 2022.
4
Automating risk analysis of software design models.自动化软件设计模型的风险分析。
ScientificWorldJournal. 2014;2014:805856. doi: 10.1155/2014/805856. Epub 2014 Jun 18.
5
Threat driven modeling framework using petri nets for e-learning system.使用Petri网的面向电子学习系统的威胁驱动建模框架。
Springerplus. 2016 Apr 14;5:446. doi: 10.1186/s40064-016-2101-0. eCollection 2016.
6
Capturing security requirements for software systems.捕获软件系统的安全需求。
J Adv Res. 2014 Jul;5(4):463-72. doi: 10.1016/j.jare.2014.03.001. Epub 2014 Mar 12.
7
SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks.SLUA-WSN:一种用于无线传感器网络的安全轻量级三因素用户认证协议。
Sensors (Basel). 2020 Jul 25;20(15):4143. doi: 10.3390/s20154143.
8
Analyzing Cyber-Physical Threats on Robotic Platforms.分析机器人平台上的网络物理威胁。
Sensors (Basel). 2018 May 21;18(5):1643. doi: 10.3390/s18051643.
9
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes.一种适用于智能家居的无线传感器网络中的轻量级三因素认证与密钥协商方案。
Sensors (Basel). 2019 Apr 29;19(9):2012. doi: 10.3390/s19092012.
10
A Framework for Cybersecurity Requirements Management in the Automotive Domain.汽车领域网络安全需求管理框架。
Sensors (Basel). 2023 May 22;23(10):4979. doi: 10.3390/s23104979.

引用本文的文献

1
Formalized aspect-oriented misuse case for specifying crosscutting security threats and mitigations.用于指定横切安全威胁及缓解措施的形式化面向方面误用案例。
PLoS One. 2025 Sep 12;20(9):e0322664. doi: 10.1371/journal.pone.0322664. eCollection 2025.
2
Seamless transformation from use case to sequence diagrams.从用例到序列图的无缝转换。
PeerJ Comput Sci. 2023 Jun 22;9:e1444. doi: 10.7717/peerj-cs.1444. eCollection 2023.