20150520 phu nguyen_slr_experimentalmethodsincs

35
How To AVOID “Reinventing The Wheel” in Doing Research? From Surveys to Systematic Literature Reviews in CS Phu H. Nguyen Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg

Transcript of 20150520 phu nguyen_slr_experimentalmethodsincs

How To AVOID “Reinventing The Wheel” in Doing Research?

From Surveys to Systematic Literature Reviews in CS

Phu H. NguyenInterdisciplinary Centre for Security, Reliability and Trust (SnT),

University of Luxembourg, Luxembourg

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 2

1. Group Exercise #12. An Introduction to SLR

Outline

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 3

1. Group Exercise #12. An Introduction to SLR

Outline

3. Doing a SLR: From A to Z

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 4

1. Group Exercise #12. An Introduction to SLR

Outline

3. Doing a SLR: From A to Z

4. Group Exercise #25. Take-Home Message

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 5

Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 6

Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 7

Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 8

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 9

Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 10

Group Exercise #1: Find the common parts in the outlines of PhD theses. (1 Point)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 11

1. Group Exercise #12. An Introduction to SLR

Outline

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 13

To summarise the existing evidence concerning a treatment or technology

Why SLR?

To identify any gaps in current research in order to suggest areas for further investigation.

To provide a framework/background in order to appropriately position new research activities.

Keele Uni’s Staffs. Guidelines for performing systematic literature reviews in software engineering. Technical report, EBSE Technical Report EBSE-2007-01, 2007.

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 14

Keele Uni’s Staffs. Guidelines for performing systematic literature reviews in software engineering. Technical report, EBSE Technical Report EBSE-2007-01, 2007.

Steps

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 15

What make Systematic Literature Reviews different from normal literature surveys?

Keele Uni’s Staffs. Guidelines for performing systematic literature reviews in software engineering. Technical report, EBSE Technical Report EBSE-2007-01, 2007.

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 16

1. Group Exercise #12. An Introduction to SLR

Outline

3. Doing a SLR: From A to Z

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 17

Model-Driven Security(MDS)

Article (Fernandez-Medina2009)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 19

Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 20

Sub-Research Questions

RQ1.1 What kinds of security mechanisms/concerns are addressed by these MDS approaches?

RQ1.2 How do the MDS approaches specify/model security requirements together with functional requirements?

RQ1.3 How model-to-model transformations (MMTs) are leveraged and which MMT engines are used?

RQ1.4 How model-to-text transformations (MTTs) are leveraged to generate code, including complete, configured security infrastructures?

Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 21

Sub-Research Questions

RQ1.5 Have any case studies been performed to evaluate the approaches? If yes, what results have been obtained? What other evaluation methods (other than case studies) have been applied to evaluate these approaches?

RQ1.6 Which application domains have been addressed in MDS approaches?

Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 22

RQ3: What are the open issues to be further investigated?

RQ2: What are the current limitations of each approach?

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 23

( “model-driven” OR “model based” OR MDA OR MDE OR model* OR UML ) AND ( specify* OR design* ) AND ( transform* OR “code generation” ) AND security

Selection Criteria

IEEE Xplore ACM Digital Library

ISI Web of Knowledge

Science Direct

Springer

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 24

Evaluation Criteria - A Taxonomy of MDS

Security concerns/mechanisms

Modeling approaches

Model-to-model transformations (MMTs)

Model-to-text transformations (MTTs)

Evaluation methods

Application domains

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 25

Results

Security concerns addressed by MDS. Why is Authorization tackled the most?

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 26

Aspect-Oriented Modeling vs. Non-AOM

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 27

Results

Model-to-model transformations

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 28

Results

Model-to-code transformations

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 29

Results

Application domains

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 30

Results in details.

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 31

Primary Approaches

UMLSec

SecureUML SECTET

SECURE DATA WAREHOUSE

SecureMDD

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 32

Group Exercise #2: Let’s fake a quick SLR on the beers being sold in Luxembourg. (1 Point)

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 33

1. Group Exercise #12. An Introduction to SLR

Outline

3. Doing a SLR: From A to Z

4. Group Exercise #25. Take-Home Message

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 34

ICTSS 2010How To AVOID “Reinventing The Wheel” in Research? Phu H. Nguyen 35

• More information? Interested? => our paper is available!

• Twitter: @nguyenhongphu

The End! Q&A