Model-Based Privacy and Security Analysis with CARiSMA

被引:13
|
作者
Ahmadian, Amir Shayan [1 ]
Peldszus, Sven [1 ]
Ramadan, Qusai [1 ]
Juerjens, Jan [1 ]
机构
[1] Univ Koblenz Landau, Mainz, Germany
关键词
System design analysis; Model-based analysis; Privacy; Security;
D O I
10.1145/3106237.3122823
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present CARiSMA, a tool that is originally designed to support model-based security analysis of IT systems. In our recent work, we added several new functionalities to CARiSMA to support the privacy of personal data. Moreover, we introduced a mechanism to assist the system designers to perform a CARiSMA analysis by automatically initializing an appropriate CARiSMA analysis concerning security and privacy requirements. The motivation for our work is Article 25 of Regulation (EU) 2016/679, which requires appropriate technical and organizational controls must be implemented for ensuring that, by default, the processing of personal data complies with the principles on processing of personal data. This implies that initially IT systems must be analyzed to verify if such principles are respected. System models allow the system developers to handle the complexity of systems and to focus on key aspects such as privacy and security. CARiSMA is available at (http://carisma.umlsec.de) and our screen cast at (https://youtu.be/b5zeHig3ARw).
引用
收藏
页码:989 / 993
页数:5
相关论文
共 50 条
  • [1] Supporting Privacy Impact Assessment by Model-Based Privacy Analysis
    Ahmadian, Amir Shayan
    Strueber, Daniel
    Riediger, Volker
    Juerjens, Jan
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1467 - 1474
  • [2] Model-Based Privacy Analysis in Industrial Ecosystems
    Ahmadian, Amir Shayan
    Strueber, Daniel
    Riediger, Volker
    Juerjens, Jan
    MODELLING FOUNDATIONS AND APPLICATIONS, ECMFA 2017, 2017, 10376 : 215 - 231
  • [3] A model-based analysis of tunability in privacy services
    Lundin, Reine
    Lindskog, Stefan
    Brunstrom, Anna
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 343 - 356
  • [4] Privacy preserving model-based authentication and data security in cloud computing
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 173 - 190
  • [5] Supporting Model-based Privacy Analysis by Exploiting Privacy Level Agreements
    Ahmadian, Amir Shayan
    Juerjens, Jan
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 360 - 365
  • [6] Model-based Security Analysis for Mobile Communications
    Juerjens, Jan
    Schreck, Joerg
    Bartmann, Peter
    ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2008, : 683 - 692
  • [7] Enforcing Security and Privacy via a Cooperation of Security Experts and Software Engineers-a Model-based Vision
    Hilbrich, Marcus
    Frank, Markus
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 237 - 240
  • [8] Model-based design and analysis of permission-based security
    Jürjens, J
    Lehrhuber, M
    Wimmel, G
    ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 224 - 233
  • [9] Ontology Model-Based Static Analysis of Security Vulnerabilities
    Yu, Lian
    Wu, Shi-Zhong
    Guo, Tao
    Dong, Guo-Wei
    Wan, Cheng-Cheng
    Jing, Yin-Hang
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 330 - +
  • [10] Model-Based Security Analysis of a Water Treatment System
    Kang, Eunsuk
    Adepu, Sridhar
    Jackson, Daniel
    Mathur, Aditya P.
    2016 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SMART CYBER-PHYSICAL SYSTEMS (SESCPS), 2016, : 22 - 28