SlideShare a Scribd company logo
1 of 17
5 MINUTES with Model-Driven Security (MDS) &
A Multilingual, Scientific Poem on MDS in a Vietnamese
Karaoke Singing Style!
Phu-Hong Nguyen
PhD candidate,
Interdisciplinary Centre for Security, Reliability and Trust,
University of Luxembourg
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 5
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 6
ADT Home Security Review: Get The Scoop On
ADT Alarm Systems
homeprotectiongeeks.com
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 7
BBC NEWS | UK | Securing your home
news.bbc.co.uk
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 8
Apache Shiro | Java Security Framework
shiro.apache.org
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 9
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 10
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 11
Securité? Why to bother?
Internet banking ”tout le monde”!
Smart phone is now a ”must”.
Face-Goog know you that ’s for sure ;)
Moien Letzebuerg, why Secherhect needed?
What if CETREL lost your info
Credit cards would have gone !
Millions of Euros to be lost
SPUERKEESS knows all the cost
Better Secure Systems must be enforced !
Introduction: Why Security important?
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 12
How about the MDS method?
Modeling the security concerns for the good
By the hands of the security experts
In a way that they must have understood
On the other hand , the business logic
Taken care by the business modelers
Those to be auto−composed together
Secure systems just one−click further !
Approach: MDS
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 13
What so good is also for the code
The language that computers like the most!
Secure code are generated at no cost ;)
From the secure models that we got !
Approach (cont.): MDS
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 14
Evaluation: Why MDS good?
Why MDS can be proved?
such as a sound method
for the secure systems to be developed.
First, at no cost to generate secure code .
Time pressure does not need a thought.
Productivity surely that we got .
New threats can be dealt till the source
Just some clicks away from models to code
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 15
Evaluation (cont.): Why MDS good?
Second, quality of the product
would it be secure and good?
Yes, of course we can prove
That secure systems are good
By model checking & testing that we did
And last but not least ,
The MDS systems are adaptive
All the new threats to be dealt with
At runtime they can be treated !
And now we reach to the conclusion .
ICTSS 2010Model-Driven SecurityPhu H. Nguyen 16
In the more digital world that we live
The more secure-systems we all need
MDS shows us what are great
For the secure systems to be fit :)
Conclusion of the Poem
Phu-Hong Nguyen
PhD candidate,
Interdisciplinary Centre for Security, Reliability and Trust,
University of Luxembourg
5 MINUTES with Model-Driven Security (MDS) &
A Multilingual, Scientific Poem on MDS in a Vietnamese
Karaoke Singing Style!

More Related Content

Similar to A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Karaoke Singing Style

Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Phu H. Nguyen
 
Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience OPITZ CONSULTING Deutschland
 
Project 3 ppt
Project 3 pptProject 3 ppt
Project 3 ppttuc31419
 
PuppetConf track overview: Security
PuppetConf track overview: SecurityPuppetConf track overview: Security
PuppetConf track overview: SecurityPuppet
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
Microservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTMicroservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTCapgemini
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogStefan Streichsbier
 
Developing a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVDeveloping a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVSeungjoo Kim
 
OTP REVIEW (1).pptx
OTP REVIEW (1).pptxOTP REVIEW (1).pptx
OTP REVIEW (1).pptxRakeshAnna2
 
Ibm watson platform – the era of the cognitive smart home public version
Ibm watson platform – the era of the cognitive smart home public versionIbm watson platform – the era of the cognitive smart home public version
Ibm watson platform – the era of the cognitive smart home public versionThorsten Schroeer
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalSorin Ciornei
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Asim Jahan
 
Web application security: how to start?
Web application security: how to start?Web application security: how to start?
Web application security: how to start?Antonio Fontes
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.techbyte2014
 

Similar to A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Karaoke Singing Style (20)

Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015Bjørnegård school visit @ Simuladagen 2015
Bjørnegård school visit @ Simuladagen 2015
 
Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience
 
Buckle Up
Buckle UpBuckle Up
Buckle Up
 
Practical uses of AI in retail
Practical uses of AI in retailPractical uses of AI in retail
Practical uses of AI in retail
 
Project 3 ppt
Project 3 pptProject 3 ppt
Project 3 ppt
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
PuppetConf track overview: Security
PuppetConf track overview: SecurityPuppetConf track overview: Security
PuppetConf track overview: Security
 
Security economics
Security economicsSecurity economics
Security economics
 
Microservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoTMicroservices: The Future-Proof Framework for IoT
Microservices: The Future-Proof Framework for IoT
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
Developing a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVDeveloping a Protection Profile for Smart TV
Developing a Protection Profile for Smart TV
 
VIISA Investment Day #4 - SecurityBox
VIISA Investment Day #4 - SecurityBoxVIISA Investment Day #4 - SecurityBox
VIISA Investment Day #4 - SecurityBox
 
OTP REVIEW (1).pptx
OTP REVIEW (1).pptxOTP REVIEW (1).pptx
OTP REVIEW (1).pptx
 
Ibm watson platform – the era of the cognitive smart home public version
Ibm watson platform – the era of the cognitive smart home public versionIbm watson platform – the era of the cognitive smart home public version
Ibm watson platform – the era of the cognitive smart home public version
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
Web application security: how to start?
Web application security: how to start?Web application security: how to start?
Web application security: how to start?
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
 

More from Phu H. Nguyen

The Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondThe Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondPhu H. Nguyen
 
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Phu H. Nguyen
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorPhu H. Nguyen
 
Master Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering DepartmentMaster Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering DepartmentPhu H. Nguyen
 
SoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure SystemsSoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure SystemsPhu H. Nguyen
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityPhu H. Nguyen
 
Model-Driven Adaptive Delegation
Model-Driven Adaptive DelegationModel-Driven Adaptive Delegation
Model-Driven Adaptive DelegationPhu H. Nguyen
 
Testing Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation AnalysisTesting Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation AnalysisPhu H. Nguyen
 
How To AVOID “Reinventing The Wheel” in Doing Research?
How To AVOID “Reinventing The Wheel” in Doing Research?How To AVOID “Reinventing The Wheel” in Doing Research?
How To AVOID “Reinventing The Wheel” in Doing Research?Phu H. Nguyen
 

More from Phu H. Nguyen (9)

The Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respondThe Fourth Industrial Revolution: What it means and how to respond
The Fourth Industrial Revolution: What it means and how to respond
 
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
 
The reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sectorThe reliability of IoT solutions in the healthcare sector
The reliability of IoT solutions in the healthcare sector
 
Master Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering DepartmentMaster Thesis Topics at Software Engineering Department
Master Thesis Topics at Software Engineering Department
 
SoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure SystemsSoSPa: A System of Security Patterns for engineering Secure Systems
SoSPa: A System of Security Patterns for engineering Secure Systems
 
A Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven SecurityA Systematic Review of Model-Driven Security
A Systematic Review of Model-Driven Security
 
Model-Driven Adaptive Delegation
Model-Driven Adaptive DelegationModel-Driven Adaptive Delegation
Model-Driven Adaptive Delegation
 
Testing Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation AnalysisTesting Delegation Policy via Mutation Analysis
Testing Delegation Policy via Mutation Analysis
 
How To AVOID “Reinventing The Wheel” in Doing Research?
How To AVOID “Reinventing The Wheel” in Doing Research?How To AVOID “Reinventing The Wheel” in Doing Research?
How To AVOID “Reinventing The Wheel” in Doing Research?
 

Recently uploaded

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 

Recently uploaded (15)

Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 

A Multilingual, Scientific Poem on Model-Driven Security in a Vietnamese Karaoke Singing Style

  • 1. 5 MINUTES with Model-Driven Security (MDS) & A Multilingual, Scientific Poem on MDS in a Vietnamese Karaoke Singing Style! Phu-Hong Nguyen PhD candidate, Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg
  • 2.
  • 3.
  • 4.
  • 6. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 6 ADT Home Security Review: Get The Scoop On ADT Alarm Systems homeprotectiongeeks.com
  • 7. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 7 BBC NEWS | UK | Securing your home news.bbc.co.uk
  • 8. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 8 Apache Shiro | Java Security Framework shiro.apache.org
  • 11. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 11 Securité? Why to bother? Internet banking ”tout le monde”! Smart phone is now a ”must”. Face-Goog know you that ’s for sure ;) Moien Letzebuerg, why Secherhect needed? What if CETREL lost your info Credit cards would have gone ! Millions of Euros to be lost SPUERKEESS knows all the cost Better Secure Systems must be enforced ! Introduction: Why Security important?
  • 12. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 12 How about the MDS method? Modeling the security concerns for the good By the hands of the security experts In a way that they must have understood On the other hand , the business logic Taken care by the business modelers Those to be auto−composed together Secure systems just one−click further ! Approach: MDS
  • 13. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 13 What so good is also for the code The language that computers like the most! Secure code are generated at no cost ;) From the secure models that we got ! Approach (cont.): MDS
  • 14. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 14 Evaluation: Why MDS good? Why MDS can be proved? such as a sound method for the secure systems to be developed. First, at no cost to generate secure code . Time pressure does not need a thought. Productivity surely that we got . New threats can be dealt till the source Just some clicks away from models to code
  • 15. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 15 Evaluation (cont.): Why MDS good? Second, quality of the product would it be secure and good? Yes, of course we can prove That secure systems are good By model checking & testing that we did And last but not least , The MDS systems are adaptive All the new threats to be dealt with At runtime they can be treated ! And now we reach to the conclusion .
  • 16. ICTSS 2010Model-Driven SecurityPhu H. Nguyen 16 In the more digital world that we live The more secure-systems we all need MDS shows us what are great For the secure systems to be fit :) Conclusion of the Poem
  • 17. Phu-Hong Nguyen PhD candidate, Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg 5 MINUTES with Model-Driven Security (MDS) & A Multilingual, Scientific Poem on MDS in a Vietnamese Karaoke Singing Style!

Editor's Notes

  1. Model checking and testing to be leveraged All the security concerns can be simulated To make sure the secure systems accomplished ! For both security concerns and business logic :)