Institutsseminar/2017-10-06 Zusatztermin: Unterschied zwischen den Versionen

Aus SDQ-Institutsseminar
(Die Seite wurde neu angelegt: „{{Termin |datum=2017/10/06 11:30:00 }}“)
 
Keine Bearbeitungszusammenfassung
 
Zeile 1: Zeile 1:
{{Termin
{{Termin
|datum=2017/10/06 11:30:00
|datum=2017/10/06 11:30:00
|raum=Raum 333 (Gebäude 50.34)
}}
}}

Aktuelle Version vom 27. September 2017, 08:17 Uhr

Termin (Alle Termine)
Datum Freitag, 6. Oktober 2017
Uhrzeit 11:30 – 12:45 Uhr (Dauer: 75 min)
Ort Raum 333 (Gebäude 50.34)
Webkonferenz
Vorheriger Termin Fr 29. September 2017
Nächster Termin Fr 13. Oktober 2017

Termin in Kalender importieren: iCal (Download)

Vorträge

Vortragende(r) Benjamin Plach
Titel A Query Language for Security Catalogs in Palladio
Vortragstyp Bachelorarbeit
Betreuer(in) Emre Taşpolatoğlu
Vortragssprache
Vortragsmodus
Kurzfassung A model-based catalog for security solutions and an architecture-based security analysis tool that helps developers without security expertise is in development at the FZI. The more the catalog grows, the harder it gets for its users to browse it manually. A query language for the security catalog would offer users an easy way to browse it and, in addition, it would support the development of the security analysis tool. During the work on this thesis, this query language was developed. Afterwards, it was evaluated on the case study CoCoME.
Vortragende(r) Christian Busch
Titel Modeling of Security Patterns in Palladio
Vortragstyp Diplomarbeit
Betreuer(in) Emre Taşpolatoğlu
Vortragssprache
Vortragsmodus
Kurzfassung Software itself and the contexts, it is used in, typically evolve over time. Analyzing and ensuring security of evolving software systems in contexts, that are also evolving, poses many difficulties. In my thesis I declared a number of goals and propose processes for the elicitation of attacks, their prerequisites and mitigating security patterns for a given architecture model and for annotation of it with security-relevant information. I showed how this information can be used to analyze the systems security, in regards of modeled attacks, using an attack validity algorithm I specify. Process and algorithm are used in a case study on CoCoME in order to show the applicability of each of them and to analyze the fulfillment of the previously stated goals. Security catalog meta-models and instances of catalogs containing a number of elements have been provided.
Neuen Vortrag erstellen

Hinweise