Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models

Author(s):  
Jens Bürger ◽  
Jan Jürjens ◽  
Thomas Ruhroth ◽  
Stefan Gärtner ◽  
Kurt Schneider
Author(s):  
WOLFGANG GRIESKAMP ◽  
NICOLAS KICILLOF ◽  
NIKOLAI TILLMANN

We describe action machines, a framework for encoding and composing partial behavioral descriptions. Action machines encode behavior as a variation of labeled transition systems where the labels are observable activities of the described artifact and the states capture full data models. Labels may also have structure, and both labels and states may be partial with a symbolic representation of the unknown parts. Action machines may stem from software models or programs, and can be composed in a variety of ways to synthesize new behaviors. The composition operators described here include synchronized and interleaving parallel composition, sequential composition, and alternating simulation. We use action machines in analysis processes such as model checking and model-based testing. The current main application is in the area of model-based conformance testing, where our approach addresses practical problems users at Microsoft have in applying model-based testing technology.


Insight ◽  
2011 ◽  
Vol 14 (2) ◽  
pp. 18-22 ◽  
Author(s):  
Daniele Gianni ◽  
Lindman Niklas ◽  
Fuchs Joachim ◽  
Suzic Robert ◽  
Fischer Daniel

Sign in / Sign up

Export Citation Format

Share Document