%0 Conference Proceedings %T Using Model Driven Security Approaches in Web Application Development %+ SBA-Research %+ Austrian Institute of Technology [Vienna] (AIT) %+ St. Poelten University of Applied Sciences %A Hochreiner, Christoph %A Ma, Zhendong %A Kieseberg, Peter %A Schrittwieser, Sebastian %A Weippl, Edgar %Z Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014 %< avec comité de lecture %( Lecture Notes in Computer Science %B 2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia) %C Bali, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Bernhard Steffen %Y Demetri Terzopoulos %Y Doug Tygar %Y Gerhard Weikum %Y Linawati %Y Made Sudiana Mahendra %Y Erich J. Neuhold %Y A Min Tjoa %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Alfred Kobsa %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %I Springer %3 Information and Communication Technology %V LNCS-8407 %P 419-431 %8 2014-04-14 %D 2014 %R 10.1007/978-3-642-55032-4_42 %K Model Driven Engineering %K Model Driven Security %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X With the rise of Model Driven Engineering (MDE) as a software development methodology, which increases productivity and, supported by powerful code generation tools, allows a less error-prone implementation process, the idea of modeling security aspects during the design phase of the software development process was first suggested by the research community almost a decade ago. While various approaches for Model Driven Security (MDS) have been proposed during the years, it is still unclear, how these concepts compare to each other and whether they can improve the security of software projects. In this paper, we provide an evaluation of current MDS approaches based on a simple web application scenario and discuss the strengths and limitations of the various techniques, as well as the practicability of MDS for web application security in general. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01397248/document %2 https://inria.hal.science/hal-01397248/file/978-3-642-55032-4_42_Chapter.pdf %L hal-01397248 %U https://inria.hal.science/hal-01397248 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-8407