Institutsseminar/2017-10-06 Zusatztermin: Unterschied zwischen den Versionen
(Die Seite wurde neu angelegt: „{{Termin |datum=2017/10/06 11:30:00 }}“) |
Keine Bearbeitungszusammenfassung |
||
Zeile 1: | Zeile 1: | ||
{{Termin | {{Termin | ||
|datum=2017/10/06 11:30:00 | |datum=2017/10/06 11:30:00 | ||
|raum=Raum 333 (Gebäude 50.34) | |||
}} | }} |
Aktuelle Version vom 27. September 2017, 08:17 Uhr
Datum | Freitag, 6. Oktober 2017 | |
---|---|---|
Uhrzeit | 11:30 – 12:45 Uhr (Dauer: 75 min) | |
Ort | Raum 333 (Gebäude 50.34) | |
Webkonferenz | ||
Vorheriger Termin | Fr 29. September 2017 | |
Nächster Termin | Fr 13. Oktober 2017 |
Termin in Kalender importieren: iCal (Download)
Vorträge
Vortragende(r) | Benjamin Plach |
---|---|
Titel | A Query Language for Security Catalogs in Palladio |
Vortragstyp | Bachelorarbeit |
Betreuer(in) | Emre Taşpolatoğlu |
Vortragssprache | |
Vortragsmodus | |
Kurzfassung | A model-based catalog for security solutions and an architecture-based security analysis tool that helps developers without security expertise is in development at the FZI. The more the catalog grows, the harder it gets for its users to browse it manually. A query language for the security catalog would offer users an easy way to browse it and, in addition, it would support the development of the security analysis tool. During the work on this thesis, this query language was developed. Afterwards, it was evaluated on the case study CoCoME. |
Vortragende(r) | Christian Busch |
---|---|
Titel | Modeling of Security Patterns in Palladio |
Vortragstyp | Diplomarbeit |
Betreuer(in) | Emre Taşpolatoğlu |
Vortragssprache | |
Vortragsmodus | |
Kurzfassung | Software itself and the contexts, it is used in, typically evolve over time. Analyzing and ensuring security of evolving software systems in contexts, that are also evolving, poses many difficulties. In my thesis I declared a number of goals and propose processes for the elicitation of attacks, their prerequisites and mitigating security patterns for a given architecture model and for annotation of it with security-relevant information. I showed how this information can be used to analyze the systems security, in regards of modeled attacks, using an attack validity algorithm I specify. Process and algorithm are used in a case study on CoCoME in order to show the applicability of each of them and to analyze the fulfillment of the previously stated goals. Security catalog meta-models and instances of catalogs containing a number of elements have been provided. |
- Neuen Vortrag erstellen