ing model-to-model transformations.
Future work will be on optimizing the translation
mechanism in such a way that similar System Re-
quirements derived from different User Requirements
are recognized and merged.
REFERENCES
Ameen, M., Liu, J., and Kwak, K. (2012). Security and pri-
vacy issues in wireless sensor networks for healthcare
applications. J. Med. Syst., 36(1):93–101.
Bouaziz, R. and Coulette, B. (2012). Applying security
patterns for component based applications using uml
profile. In Computational Science and Engineering
(CSE), 2012 IEEE 15th International Conference on,
pages 186–193.
Di Pietro, R. and Mancini, L. V. (2003). Security and
privacy issues of handheld and wearable wireless de-
vices. Commun. ACM, 46(9):74–79.
Ferrante, A., Milosevic, J., and Janjusevic, M. (2013). A
security-enhanced design methodology for embedded
systems. In ICETE SECRYPT 2013, Reykjavik, Ice-
land. ICETE.
ISO/IEC (2009). ISO/IEC 15408-3 – Evaluation criteria for
IT security – Part 3: Security assurance components.
J¨urjens, J. (2003). Secure Systems Development with UML.
Springer Verlag.
Kargl, F., Lawrence, E., Fischer, M., and Lim, Y. Y. (2008).
Security, privacy and legal issues in pervasive ehealth
monitoring systems. In Mobile Business, 2008. ICMB
’08. 7th International Conference on, pages 296–304.
Kocher, P., Lee, R., McGraw, G., and Raghunathan, A.
(2004). Security as a new dimension in embedded
system design. In Proceedings of the 41st annual De-
sign Automation Conference, DAC ’04, pages 753–
760, New York, NY, USA. ACM. Moderator-Ravi,
Srivaths.
K¨oster, F., Nguyen, H., Obermeier, S., Br¨andle, M., Klaas,
M., Naedele, M., and Brenner, W. (2009). Informa-
tion security assessments for embedded systems de-
velopment: An evaluation of methods. In 8th Annual
Security Conference, Las Vegas, USA.
Markose, S., Liu, X., and McMillin, B. (2008). A system-
atic framework for structured object-oriented security
requirements analysis in embedded systems. In Em-
bedded and Ubiquitous Computing, 2008. EUC ’08.
IEEE/IFIP International Conference on, volume 1,
pages 75–81.
Massacci, F., Mylopoulos, J., and Zannone, N. (2010). Se-
curity requirements engineering: The si* modeling
language and the secure tropos methodology. In Ras,
Z. and Tsay, L.-S., editors, Advances in Intelligent In-
formation Systems, volume 265 of Studies in Compu-
tational Intelligence, pages 147–174. Springer Berlin
Heidelberg.
Object Management Group (2011). Unified Mod-
eling Language Infrastructure, 2.4.1 edition.
http://www.omg.org/spec/UML/2.4.1.
Poon, C. C. Y., Zhang, Y.-T., and Bao, S.-D. (2006). A
novel biometrics method to secure wireless body area
sensor networks for telemedicine and m-health. Com-
munications Magazine, IEEE, 44(4):73–81.
Rodriguez, A., Fernandez-Medina, E., and Piattini, M.
(2006). Security requirement with a uml 2.0 profile.
In Availability, Reliability and Security, 2006. ARES
2006. The First International Conference on.
Roudier, Y., Idrees, M. S., and Apvrille, L. (2013). Towards
the model-driven engineering of security requirements
for embedded systems. In MODRE 2013, Interna-
tional Workshop on Model-Driven Requirements En-
gineering, 15 July 2013, Rio de Janeiro, Brazil, Rio
de Janeiro, BRAZIL.
The Eclipse Foundation (2013a). Eclipse development en-
vironment. http://www.eclipse.org.
The Eclipse Foundation (2013b). Papyrus UML modeling
tool. http://www.eclipse.org/modeling/mdt/papyrus.
The Eclipse Foundation (2013c). VIATRA2, VI-
sual Automated model TRAnsformations.
http://www.eclipse.org/gmt/VIATRA2/.
Viega, J. and Thompson, H. (2012). The state of embedded-
device security (spoiler alert: It’s bad). Security Pri-
vacy, IEEE, 10(5):68 –70.
Yu, E. (1997). Towards modelling and reasoning support
for early-phase requirements engineering. In Require-
ments Engineering, 1997., Proceedings of the Third
IEEE International Symposium on, pages 226–235.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
320