Skip to main content
Article
Performance Analysis of Security Aspects in UML Models
Faculty Research & Creative Activity
  • Dorin Bogdan Petriu, Carleton University
  • Dorina C Petriu, Carleton University
  • C Murray Woodside, Carleton University
  • Jing Xiu, Carleton University
  • Toqeer A Israr, Eastern Illinois University
  • Geri Georg, Colorado State University
  • Robert B. France, Colorado State University - PuebloColorado State University
  • James M Bieman, Colorado State University - PuebloColorado State University
  • Siv Holde Houmb, Norwegian Univ. of Science & Tech.
  • Jan Jurjens, TU Munich
Creative Commons License
Creative Commons Attribution-Noncommercial-No Derivative Works 4.0
Document Type
Article
Publication Date
1-1-2007
Abstract
The focus of the paper is on the analysis of performance effects of different security solutions modeled as aspects in UML. Aspect oriented modeling (AOM) allows software designers to isolate and separately address solutions for crosscutting concerns, which are defined as distinct UML aspect models, then are composed with the primary UML model of the system under development. For performance analysis we use techniques developed previously in the PUMA project, which take as input UML models annotated with the standard UML Profile for Schedulability, Performance and Time (SPT), and transform them first into Core Scenario Model (CSM) and then into different performance models. The contribution of this paper is in performing the composition of the aspects with the primary model at the CSM level. The input is represented by the primary model and a number of aspect models in UML+SPT, which are processed as follows: a) converted separately to CSM; b) composed into a single CSM model; c) transformed into a Layered Queueing Networks (LQN) model and d) analyzed. The proposed approach is illustrated with a case study based on two standards, TPC-W and SSL.
Citation Information
Dorin Bogdan Petriu, Dorina C Petriu, C Murray Woodside, Jing Xiu, et al.. "Performance Analysis of Security Aspects in UML Models" (2007)
Available at: http://works.bepress.com/toqeer_israr/12/