Show simple item record

dc.contributor.authorJohnson, Andrew
dc.date.accessioned2020-04-30T10:46:42Z
dc.date.available2020-04-30T10:46:42Z
dc.date.issued2019-04-25
dc.identifier.urihttps://scholars.carroll.edu/handle/20.500.12647/7272
dc.description.abstractWith Advanced Persistent Threats (APTs) becoming a larger threat among the cyber world, it is important that software is designed with security in mind. In order to aide this process, software developers can use design patterns when creating systems. All aspects of a system's design should be concerned with security, because any one point of weakness can still lead to the compromise of the entire system. We propose a method of determining if a system contains a security pattern, and we suggest several security patterns which might be helpful in deterring a specific APT. We utilize an algorithm based on graph homomorphism theory that gives a metric for how close a UML model is to being a realization of a security pattern, from which it may be verified that a system is indeed a realization of the Role Based Modeling Language (RBML) model of the pattern. We find that our distance metric gives the desired result for several example applications.
dc.titleUsing Role Based Modeling Language to Determine Safety from Advanced Persistent Threats
carrollscholars.object.disciplinesApplied Mathematics; Information Security; Systems Architecture
carrollscholars.legacy.itemurlhttps://scholars.carroll.edu/surf/2019/all/109
carrollscholars.legacy.contextkey14306440
carrollscholars.object.majorComputer Science and Mathematics
carrollscholars.object.fieldofstudyComputer Science
carrollscholars.location.campusbuildingCampus Center - Rice
carrollscholars.event.startdate4/25/2019 13:30
carrollscholars.event.enddate4/25/2019 13:45
carrollscholars.contributor.emailaljohnson@carroll.edu
carrollscholars.contributor.institutionCarroll College


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record