B for Modeling Secure Information Systems | SpringerLink
Skip to main content

B for Modeling Secure Information Systems

The B4MSecure Platform

  • Conference paper
  • First Online:
Formal Methods and Software Engineering (ICFEM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9407))

Included in the following conference series:

Abstract

Several approaches dedicated to model access control policies (e.g. MDA-Security, SecureUML, UMLSec, etc.) have used the Model Driven Engineering paradigm in order to ensure a clear separation of business rules and constraints specific to a target technology. Their supporting techniques mainly focus on modeling and verification of security rules without taking into account the functional model of the application and its interaction with the security model. In order to take into account both models, we developed the B4MSecure platform. It is a Model Driven Engineering platform that allows to graphically model and formally reason on both functional and security models. It translates a UML class diagram associated to a SecureUML model into formal B specifications. The resulting B specifications follow the separation of concerns principles in order to be able to validate both models separately and then validate their interactions. This paper gives an overview of our platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://telemedecine.ifremmont.com/ifrelab/index.php?Wwwresamuorg.

  2. 2.

    http://www.ifremmont.com.

References

  1. Abrial, J.-R.: The B-book: Assigning Programs to Meanings. Cambridge University Press, New York (1996)

    Book  MATH  Google Scholar 

  2. Basin, D.A., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Inf. Soft. Technol. 51(5), 815–831 (2009)

    Article  Google Scholar 

  3. Hazem, L., Levy, N., Marcano-Kamenoff, R.: UML2B: un outil pour la génération de modèles formels. In: Julliand, J. (ed.) AFADL 2004 - Session Outils (2004)

    Google Scholar 

  4. Laleau, R., Mammar, A.: An overview of a method and its support tool for generating B specifications from UML notations. In: 15th IEEE International Conference on Automated Software Engineering, pp. 269–272. IEEE Computer Society Press (2000)

    Google Scholar 

  5. Laleau, R., Polack, F.A.C.: Coming and going from UML to B: a proposal to support traceability in rigorous IS development. In: Bert, D., Bowen, J.P., C. Henson, M., Robinson, K. (eds.) B 2002 and ZB 2002. LNCS, vol. 2272, pp. 517–534. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Ledang, H.: Automatic translation from UML specifications to B. In: Automated Software Engineering, p. 436. IEEE Computer Society (2001)

    Google Scholar 

  7. Ledru, Y., Idani, A., Milhau, J., Qamar, N., Laleau, R., Richier, J.-L., Labiadh, M.-A.: Taking into account functional models in the validation of IS security policies. In: Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. LNBIP, vol. 83, pp. 592–606. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Leuschel, M., Butler, M.: ProB: a model checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 855–874. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Meyer, E.: Développements formels par objets: utilisation conjointe de B et d’UML. Ph.D. thesis, Université de Nancy 2, Mars 2001

    Google Scholar 

  10. Milhau, J., Idani, A., Laleau, R., Labiadh, M.-A., Ledru, Y., Frappier, M.: Combining UML, ASTD and B for the formal specification of an access control filter. ISSE 7(4), 303–313 (2011)

    Google Scholar 

  11. OMG: Mda guide version 1.0.1, June 2003. http://www.omg.org/mda/

  12. Radhouani, A., Idani, A., Ledru, Y., Rajeb, N.B.: Extraction of insider attack scenarios from a formal information system modeling. In: Proceedings of the Formal Methods for Security Workshop Co-located with the PetriNets-2014 Conference. CEUR Workshop Proceedings, vol. 1158, pp. 5–19. CEUR-WS.org (2014)

    Google Scholar 

  13. Snook, C., Butler, M.: U2B-A tool for translating UML-B models into B. In: Mermet, J. (ed) UML-B Specification for Proven Embedded Systems Design (2004)

    Google Scholar 

  14. Snook, C., Butler, M.: UML-B: formal modeling and design aided by UML. ACM Trans. Soft. Eng. Methodol. (TOSEM) 15(1), 92–122 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akram Idani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Idani, A., Ledru, Y. (2015). B for Modeling Secure Information Systems. In: Butler, M., Conchon, S., Zaïdi, F. (eds) Formal Methods and Software Engineering. ICFEM 2015. Lecture Notes in Computer Science(), vol 9407. Springer, Cham. https://doi.org/10.1007/978-3-319-25423-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25423-4_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25422-7

  • Online ISBN: 978-3-319-25423-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics