% !TEX root = main.tex

\section{Evaluation of Model Driven Security Methodologies}
\label{sec:evaluation}

%The Y-Model is a foundational concept model generally illustrating \mds process: 
%it enriches the \mda philosophy of \emph{vertically} separating high-level abstraction of a system from its low-level implementation details 
%with the \emph{horizontal} separation of high-level security concerns from business concerns. 

In this section, we use our proposed Y-Model as a general schema and criteria to evaluate the modeling and security analysis capabilities of
five \mds methodologies from the literature, which are selected by the keyword ``Model Driven Security'' and citation popularity in relevant papers:
\emph{UMLsec}
\cite{springerlink:10.1007/3-540-45314-8-14,springerlink:10.1007/11804192-4},
\emph{secureUML}
\cite{Basin:2006:MDS:1125808.1125810,Basin:2011:DMS:1998441.1998443,Basin:2003:MDS:775412.775425},
\emph{SECTET}
\cite{mdse-breu-jos-2007,10.1007/s10009-007-0045-y}, \emph{ProSecO}
\cite{10.1007/978-3-540-78942-0-8} and \emph{ModelSec}
\cite{sanchez:jucs-15-15}.
We firstly evaluate these \mds methodologies in groups which are categorized by the modeling languages ({\dsl}s) that these \mds methodologies are using.
Then we use a comparison table to summarize the evaluation result of these \mds methodologies.
Finally we discuss the drawbacks of these \mds methodologies.


%\input{UMLSec}
%\input{SecureUML}
%\input{SECTET}
%\input{ProSecO}
%\input{ModelSec}

%\input{umlprofile}
\input{umlprofile2}
\input{tailoreddsl}
\input{synthesis}
\input{criticism}


