An advanced security ontology with MDA and a software tool for modelling security requirements in distributed computer system development

Gespeichert in:
Bibliographische Detailangaben
Titel: An advanced security ontology with MDA and a software tool for modelling security requirements in distributed computer system development
Autoren: Kang, Wentao
Verlagsinformationen: University of the West of Scotland, 2017.
Publikationsjahr: 2017
Bestand: University of the West of Scotland
Schlagwörter: 005.8
Beschreibung: Currently security plays a crucial and important role in distributed computer system development owing to the rapid development in information technology and network technology (Emmerich, 1997; Coulouris et al. 2005; Padmanabhuni and Sundarrajan 2009; Prakash and Darbari, 2012; UKEssays 2015, p. 1). According to many previous studies on distributed computer system security people wish to protect their resources and require security software for detecting and preventing system loopholes and attacks (Lakshmi and Praveen, 2015, p. 14). Such concerns must be elicited from resources owners and then specified as security requirements for distributed computer system development. There was a deficiency of strengthening security concerns between modelling techniques and software development process. Security ontology is a suitable way that can be adopted to map security standards (Ramanauskaite, 2013, p.878). To overcome the deficiencies of security modelling techniques in distributed computer system development, new security ontology that integrates the latest security concerns is necessary . This security ontology will allow the developers and users of distributed computer systems to consider the latest security concerns and the related security implementation techniques appropriately during the development of distributed computer systems. This thesis presents the work done in a current research project that specifically focuses on the elicitation and modelling of security requirements in distributed computer system development. First, the research background and literature review are presented and the research methodologies used in the study are described. Second a series of security related elements are proposed and categorized; these elements can be used to meet the user’s security requirements for the distributed computer system. In addition, these elements are mapped into security implementation techniques for distributed computer system development. Third the security related elements are applied to create a series of security ontology diagrams that can be applied to elicit security concerns from a high level to a low level during distributed computer system development. In particular, the contributions of the proposed security ontology diagrams can help users elicit the latest security requirements and map security requirements for realizing appropriate security implementation techniques for distributed computer system development. According to the proposed security ontology diagrams, model driven architecture (MDA) has been utilized for enforcing security concerns during distributed computer system development. More specifically a meta security model was created using ontology for eliciting security concerns and relationships. Then based on this model, a security framework was created for modelling security requirements at different levels to support transformation from security concerns to security requirements and then to security implementations. These theoretical contributions can help users and developers to model security concerns and provide an approach for transforming security models during distributed computer system development. Subsequently, the proposed security ontology diagrams with MDA were applied in four real case studies. Based on the proposed ontology diagrams and ontology framework, a software tool was developed to support the proposed security ontology diagrams with MDA for modelling security requirements in distributed computer system development. This tool can help users and developers to view the proposed security ontology diagrams more efficiently. Further, the proposed security ontology diagrams, ontology framework and software tool were tested. This thesis presents the evaluation and discussion of the present research based on the test results. Finally, the conclusion and future work are presented.
Publikationsart: Electronic Thesis or Dissertation
Sprache: English
Zugangs-URL: https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.810788
Dokumentencode: edsble.810788
Datenbank: British Library EThOS