{"id":1653,"date":"2024-02-22T07:37:53","date_gmt":"2024-02-22T12:37:53","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1653"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-a-security-compliance-by-design-framework-utilizing-reusable-formal-models","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2024\/new-publication-a-security-compliance-by-design-framework-utilizing-reusable-formal-models\/","title":{"rendered":"New Publication: A Security Compliance-by-Design Framework Utilizing Reusable Formal Models"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: A Security Compliance-by-Design Framework Utilizing Reusable Formal Models\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our recent work proposing a methodology to enhance the security of software systems by incorporating compliance verification from the early stages of design is now available online! In this work, we present a novel method for modeling a security compliance baseline based on the specification and reuse of analysis models targeting standards, policies, and regulations. This approach streamlines the compliance process, facilitating adherence to multiple security standards while promoting the reuse of security compliance analysis models. To demonstrate the practicality of the suggested framework and technique, we illustrate representative architecture compliance checks on a Supervisory Control and Data Acquisition (SCADA) system. The work was presented at the <a href=\"https:\/\/qrs23.techconf.org\/\">23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023)<\/a>. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our recent work proposing a methodology to enhance the security of software systems by incorporating compliance verification from the early stages of design is now available online! In this work, we present a novel method for modeling a security compliance baseline based on the specification and reuse of analysis models targeting standards, policies, and regulations. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1653"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1653\/revisions"}],"predecessor-version":[{"id":1654,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1653\/revisions\/1654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}