search menu icon-carat-right cmu-wordmark

Using Model-Based Engineering and Architectural Models to Build Secure Systems

White Paper
In this paper, the authors present analytical techniques to model and validate security protocols for enforcing confidentiality and integrity.

Software Engineering Institute


A system designer faces several challenges when specifying security for distributed computing environments or migrating systems to a new execution platform. Business stakeholders impose constraints due to cost, time-to- market requirements, productivity impact, customer satisfaction concerns, and the like. And users exercise power at the desktop over computing resources and data availability. So, a system designer needs to understand requirements regarding protected resources (e.g., data), confidentiality, and integrity. And, a designer needs to predict the effect that security measures will have on other runtime quality attributes such as resource consumption, availability, and real-time performance.