Modeling, Design and Analysis of secure systems
In [1,3] we present methods concealment of data by breaking it into fragments which are encrypted and moved to random locations. In [4] advocate the use of Aspect-Oriented Risk-Driven Development (AORDD) methodology for system development. However, there is often a tradeoff between implementing security and performance. In [5,6], AORDD is extended to by allowing tradeoff analysis.
In these research projects, I collaborate with Geri Georg, Indrakshi Ray, Robert France and other colleagues at Colorado State University and Rachid Anane at Coventry.
Selected publications
-
Stateless data concealment for Distributed Systems, R. Anane, S. Dhillon and B .Bordbar, Journal of Computer and System Sciences, Vol. 74(2), pages 243-254, 2008
-
Trusted P2P Group Interaction, R. Anane, S. Marrocco and B. Bordbar, 2nd International Conference on Computer Science and its Applications (CSA 09), IEEE Publication, Jeju, Korea, December 2009.
-
A Distributed Scheme for Secure Data Access, R. Anane, S. Dhillon and B. Bordbar, Proceeding of IEEE workshop on Web and Mobile Information Systems (WAMIS 06) pages 267-271, 2006.
-
An aspect-oriented methodology for designing secure applications, G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S. H. Houmb, Journal of Information and Software Technology, Volume 51, Issue 5, Pages 846-864, 2009
-
Verification and Trade-off Analysis of Security Properties in UML System Models, G. Georg, K. Anastasakis, B. Bordbar, S. H. Houmb, I. Ray, M. Toahchoodee, accepted for publication in IEEE Transactions on Software Engineering, Volume 36 no. 3, Pages 338 - 356, 2010
-
Balancing Security and Performance Properties During System Architectural Design, S-H Houmb, G. Georg, D. C. Petriu, B. Bordbar, I. Ray, K. Anastasakis and R. France, To appear as a book chapter in Software Engineering for Secure Systems: Industrial and Research Perspectives, 2010
