CN106529302A - MDA and UML extension based software development method - Google Patents

MDA and UML extension based software development method Download PDF

Info

Publication number
CN106529302A
CN106529302A CN201610937667.3A CN201610937667A CN106529302A CN 106529302 A CN106529302 A CN 106529302A CN 201610937667 A CN201610937667 A CN 201610937667A CN 106529302 A CN106529302 A CN 106529302A
Authority
CN
China
Prior art keywords
security
mda
model
uml
software development
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610937667.3A
Other languages
Chinese (zh)
Inventor
黄万壮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei East Multimedia Technology Co Ltd
Original Assignee
Hefei East Multimedia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei East Multimedia Technology Co Ltd filed Critical Hefei East Multimedia Technology Co Ltd
Priority to CN201610937667.3A priority Critical patent/CN106529302A/en
Publication of CN106529302A publication Critical patent/CN106529302A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an MDA and UML extension based software development method. The MDA and UML extension based software development method comprises a first step of building an MDA model conversion chain, including, a CIM model, a PIM model, a PSM model and codes; and a second step of building a security analysis model, to be specific, analyzing the security of a system to obtain description of security characteristics and generating a security characteristic explanation document of the system, wherein the security characteristics comprise a performance description characteristic and a function description characteristic. Through UML sec extension, common security demands such as confidentiality, integrity and authenticity can be provided in a form of standard elements. Whether the system meets related security demands can be determined through the built security analysis model; and the security of codes can also be verified through testing sequences generated in the model.

Description

A kind of software development methodology based on MDA and UML extensions
Technical field
The invention belongs to technical field of software development, more particularly to a kind of software development side based on MDA and UML extensions Method.
Background technology
Ever-increasing network Complex Parts and uneasy total event and internetwork connection so that computer information system is more next It is easily under attack, threaten people and each institutional interests.Traditional method for ensuring information security is " infiltration and benefit Fourth ", you can have defect to receive system, is deleted or is repaired once find to spring a leak the infiltration of system or identification. But the method is unsatisfactory, inherently there is security threat in external enwergy to patch, and often just have resulted in before leak is repaired Loss.
In view of the security status of practical application Computer, it is considered to by safety analysiss and the software development side based on model It is a kind of preferable solution that method is combined.Existing some scholars are studied to this, propose the various methods do not colluded, such as The method for considering issued transaction security model;The mould of safety analysis is carried out by creating Security Object and fault tree analysiss assessment Type drive software development approach;Model driven method based on safe XML data structure etc..
The content of the invention
It is an object of the invention to provide a kind of software development methodology based on MDA and UML extensions, is expanded by UMLsec Whether exhibition, meet the demand for security of correlation by the safety analysis model determination system set up, can also be by raw from model Into cycle testss, the safety of code is checked.
The present invention is achieved by the following technical solutions:
The present invention is a kind of software development methodology based on MDA and UML extensions, comprises the steps:
Step one, the foundation of MDA model conversion chains:Including CIM, PIM models, PSM models and code;
Step 2, the foundation of safety analysis model:It is analyzed by the safety to system, draws retouching for security feature State, and generate the security feature explanation document of system;The described security feature includes performance Expressive Features and function Expressive Features.
Preferably, the performance Expressive Features are directly added to CIM and calculate independence model, and are converted to security performance Test case.
Preferably, the function Expressive Features are modeled by UMLsec extension mechanisms, and are realized user and visited with RBAC PIM models are added to after the logical separation for asking authority.
Preferably, the Profile in the UML provides a general extension mechanism, for specific area platform By the self-defining uml model of developer, UMLsec using standard UML extension mechanisms and carried in the form of UML Profile For.
The invention has the advantages that:
, by UMLsec extensions, common demand for security, such as confidentiality, integrity and verity can be with for the present invention The form of specification element is provided.Whether the demand for security of correlation is met by the safety analysis model determination system set up, also The safety of code can be checked by cycle testss are generated from model.
Certainly, the arbitrary product for implementing the present invention is it is not absolutely required to while reaching all the above advantage.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, use required for describing to embodiment below Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, can be attached to obtain others according to these accompanying drawings Figure.
Fig. 1 is a kind of flow chart of software development methodology based on MDA and UML extensions of the present invention;
Fig. 2 is a kind of system block diagram of software development methodology based on MDA and UML extensions of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is all other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Refer to shown in Fig. 1 and Fig. 2, the present invention is a kind of software development methodology based on MDA and UML extensions, including such as Lower step:
Step one, the foundation of MDA model conversion chains:Including CIM, PIM models, PSM models and code;
Step 2, the foundation of safety analysis model:It is analyzed by the safety to system, draws retouching for security feature State, and generate the security feature explanation document of system;The described security feature includes performance Expressive Features and function Expressive Features.
Wherein, performance Expressive Features are directly added to CIM and calculate independence model, and are converted to security performance test use Example.
Wherein, function Expressive Features are modeled by UMLsec extension mechanisms, and realize user and access rights with RBAC Logical separation after be added to PIM models.
Wherein, the Profile in UML provides a general extension mechanism, for specific area platform by developing The self-defining uml model of person, UMLsec have been used the UML extension mechanisms of standard and are provided in the form of UML Profile.
After obtaining the PIM of system integration Safety modeling, check automatically UMLsec extended architectures type to close by support instrument The constraint of connection, then carries out XML Metadata exchange (XML-based Metadata Interchange, XMI) output, by expanding Exhibition CSS transfer language (Extensible Stylesheet Language Transformations, XSLT) is formulated and is directed to The transformational rule of different platform, realization ask the conversion of PSM, that is, the security attribute in PIM is mapped to specific platform, so After be converted into code, be finally achieved the security strategy in software.Above institute established model is all Platform Independent Model.By Supports of the Arcstyler to MDA, automatically generates PSM from the PIM for building, is then converted to application code, and ultimately generating can The application program for possessing security attribute for performing.
It should be noted that in said system embodiment, included unit simply carries out drawing according to function logic Point, but above-mentioned division is not limited to, as long as corresponding function can be realized;In addition, each functional unit is concrete Title is also only to facilitate mutually differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that realizing all or part of step in the various embodiments described above method Program be can be by instruct the hardware of correlation to complete, corresponding program can be stored in embodied on computer readable storage and be situated between In matter, described storage medium, such as ROM/RAM, disk or CD etc..
Present invention disclosed above preferred embodiment is only intended to help and illustrates the present invention.Preferred embodiment is not detailed All of details is described, it is only described specific embodiment also not limit the invention.Obviously, the content according to this specification, Can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is to preferably explain the present invention Principle and practical application so that skilled artisan can be best understood by and utilize the present invention.The present invention is only Limited by claims and its four corner and equivalent.

Claims (3)

1. a kind of software development methodology based on MDA and UML extension, it is characterised in that comprise the steps:
Step one, the foundation of MDA model conversion chains:Including CIM, PIM models, PSM models and code;
Step 2, the foundation of safety analysis model:It is analyzed by the safety to system, draws the description of security feature, And generate the security feature explanation document of system;The described security feature includes performance Expressive Features and function Expressive Features.
2. a kind of software development methodology based on MDA and UML extension according to claim 1, it is characterised in that the property Energy Expressive Features are directly added to CIM and calculate independence model, and are converted to security performance test case.
3. a kind of software development methodology based on MDA and UML extension according to claim 1, it is characterised in that the work( Energy Expressive Features are modeled by UMLsec extension mechanisms, and are added after realizing logical separation of the user with access rights with RBAC To PIM models.
CN201610937667.3A 2016-10-25 2016-10-25 MDA and UML extension based software development method Pending CN106529302A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610937667.3A CN106529302A (en) 2016-10-25 2016-10-25 MDA and UML extension based software development method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610937667.3A CN106529302A (en) 2016-10-25 2016-10-25 MDA and UML extension based software development method

Publications (1)

Publication Number Publication Date
CN106529302A true CN106529302A (en) 2017-03-22

Family

ID=58293300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610937667.3A Pending CN106529302A (en) 2016-10-25 2016-10-25 MDA and UML extension based software development method

Country Status (1)

Country Link
CN (1) CN106529302A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115756403A (en) * 2022-11-07 2023-03-07 苏州数设科技有限公司 Model drive design method and device, electronic equipment and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1737756A (en) * 2004-02-24 2006-02-22 株式会社东芝 Data converting device and program for data conversion
CN103995699A (en) * 2014-05-13 2014-08-20 中国神华能源股份有限公司 Electric power enterprise information system development method based on MDA

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1737756A (en) * 2004-02-24 2006-02-22 株式会社东芝 Data converting device and program for data conversion
CN103995699A (en) * 2014-05-13 2014-08-20 中国神华能源股份有限公司 Electric power enterprise information system development method based on MDA

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁柯 等: "基于MDA与UML扩展的安全软件开发方法", 《计算机工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115756403A (en) * 2022-11-07 2023-03-07 苏州数设科技有限公司 Model drive design method and device, electronic equipment and readable storage medium
CN115756403B (en) * 2022-11-07 2023-12-12 苏州数设科技有限公司 Model drive design method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
Estefan Survey of model-based systems engineering (MBSE) methodologies
Garcia et al. Interoperability from building design to building energy modeling
US9015648B2 (en) Roundtrip merge of BPEL processes and BPMN models
Bergmann et al. Semantic interoperability to enable smart, grid-interactive efficient buildings
US8479159B2 (en) System and method for automatically determining relationships between software artifacts using multiple evidence sources
US20130117232A1 (en) Snapshots of database models
KR101106220B1 (en) System for environmental load assessment during life cycle of building
CN116257926B (en) BIM-based Internet of things data binding method, device, equipment and storage medium
Mens Model transformation: A survey of the state of the art
Biswas et al. Data sharing for sustainable building assessment
US20120166884A1 (en) LEVERAGING THE RELATIONSHIP BETWEEN OBJECT IDs AND FUNCTIONS IN DIAGNOSING SOFTWARE DEFECTS DURING THE POST-DEPLOYMENT PHASE
US8423951B1 (en) Systems and/or methods for identifying corresponding elements in different models
CN109614084A (en) Web program and its Quick Development Framework, development approach and relevant device
Kasim et al. Automated sustainability compliance checking process: proof of concept
CN106997322A (en) Method and apparatus for automatic test
CN106529302A (en) MDA and UML extension based software development method
Quek Strategies and frameworks for adopting Building Information Modelling (BIM) for quantity surveyors
Khattra et al. A statistical review to study the structural stability of buildings using building information modelling
Kim Design pattern based model transformation with tool support
CN104951312B (en) A kind of business function custom-built system based on model-driven
CN104239070B (en) Software development method based on live documents
East et al. Lightweight capture of as-built construction information
Muthumanickam et al. Development of a novel BIM-energy use ontology
Shih et al. Development of building information modelling enabled code checking systems for Australia
Lai et al. 2-square: A web-based enhancement of square privacy and security requirements engineering

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322