<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-018-20-2920</article-id>
      <article-id pub-id-type="publisher-id">23985</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>C.2.0 - General</subject>
          <subject>C.2.4 - Distributed Systems</subject>
          <subject>D.2.0 - General</subject>
          <subject>D.2.1 - Requirements/Specifications</subject>
          <subject>D.2.2 - Design Tools and Techniques</subject>
          <subject>D.4.6 - Security and Protection</subject>
          <subject>K.6.5 - Security and Protection</subject>
          <subject>L.4 - SECURITY/TRUST</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Engineering Security into Distributed Systems: A Survey of Methodologies</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Uzunov</surname>
            <given-names>Anton V.</given-names>
          </name>
          <email xlink:type="simple">anton.uzunov@adelaide.edu.au</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Fernandez</surname>
            <given-names>Eduardo B.</given-names>
          </name>
          <xref ref-type="aff" rid="A2">2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Falkner</surname>
            <given-names>Katrina</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">University of Adelaide, Adelaide, Australia</addr-line>
        <institution>University of Adelaide</institution>
        <addr-line content-type="city">Adelaide</addr-line>
        <country>Australia</country>
      </aff>
      <aff id="A2">
        <label>2</label>
        <addr-line content-type="verbatim">Florida Atlantic University, Boca Raton, United States of America</addr-line>
        <institution>Florida Atlantic University</institution>
        <addr-line content-type="city">Boca Raton</addr-line>
        <country>United States of America</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Anton V. Uzunov (<email xlink:type="simple">anton.uzunov@adelaide.edu.au</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2012</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>12</month>
        <year>2012</year>
      </pub-date>
      <volume>18</volume>
      <issue>20</issue>
      <fpage>2920</fpage>
      <lpage>3006</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/57D0BFB0-0A20-5529-B663-4EC155BECCA0">57D0BFB0-0A20-5529-B663-4EC155BECCA0</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/5506207">5506207</uri>
      <history>
        <date date-type="received">
          <day>24</day>
          <month>02</month>
          <year>2012</year>
        </date>
        <date date-type="accepted">
          <day>28</day>
          <month>11</month>
          <year>2012</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Anton V. Uzunov, Eduardo B. Fernandez, Katrina Falkner</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>Rapid technological advances in recent years have precipitated a general shift towards software distribution as a central computing paradigm. This has been accompanied by a corresponding increase in the dangers of security breaches, often causing security attributes to become an inhibiting factor for use and adoption. Despite the acknowledged importance of security, especially in the context of open and collaborative environments, there is a growing gap in the survey literature relating to systematic approaches (methodologies) for engineering secure distributed systems. In this paper, we attempt to fill the aforementioned gap by surveying and critically analyzing the state-of-the-art in security methodologies based on some form of abstract modeling (i.e. model-based methodologies) for, or applicable to, distributed systems. Our detailed reviews can be seen as a step towards increasing awareness and appreciation of a range of methodologies, allowing researchers and industry stakeholders to gain a comprehensive view of the field and make informed decisions. Following the comprehensive survey we propose a number of criteria reflecting the characteristics security methodologies should possess to be adopted in real-life industry scenarios, and evaluate each methodology accordingly. Our results highlight a number of areas for improvement, help to qualify adoption risks, and indicate future research directions.</p>
      </abstract>
    </article-meta>
  </front>
</article>
