An engineering process for security patterns application in component based models

被引:7
|
作者
Bouaziz, Rahma [1 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
Component; Component based systems; Security patterns; Process; Aspects; SPEM;
D O I
10.1109/WETICE.2013.27
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security engineering with patterns is currently a very active area of research. Security patterns - an adaptation of Design Patterns to security - capture experts' experience in order to solve recurrent security problems in a structured and reusable way. In this paper, our objective is to describe an engineering process, called SCRIP (SeCurity patteRn Integration Process), which provides guidelines for integrating security patterns into component-based models. SCRIP defines activities and products to integrate security patterns in the whole development process, from UML component modeling until aspect code generation. The definition of SCRIP has been made using the OMG standard Software and System Process Engineering Meta-model (SPEM). We are developing a CASE tool to support that process.
引用
收藏
页码:231 / 236
页数:6
相关论文
共 50 条
  • [21] A concept for engineering smart grid security requirements based on SGAM models
    Neureiter, Christian
    Eibl, Guenther
    Engel, Dominik
    Schlegel, Stefanie
    Uslar, Mathias
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2016, 31 (1-2): : 65 - 71
  • [22] Reverse engineering software-models of component-based systems
    Chouambe, Landry
    Klatt, Benjamin
    Krogmann, Klaus
    CSMR 2008: 12TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: DEVELOPING EVOLVABLE SYSTEMS, 2008, : 93 - 102
  • [23] Component-Based Robotic Engineering (Part II) Systems and Models
    Brugali, Davide
    Shakhimardanov, Azamat
    IEEE ROBOTICS & AUTOMATION MAGAZINE, 2010, 17 (01) : 100 - 112
  • [24] Attribute-Based Security Verification of Business Process Models
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1, 2017, 1 : 43 - 52
  • [25] Model-based security testing Deriving test models from artefacts of security engineering
    Lunkeit, Armin
    Schieferdecker, Ina
    2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2018, : 244 - 251
  • [26] Engineering Management Models for Urban Security
    Muaafa, Mohammed
    Ramirez-Marquez, Jose Emmanuel
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2017, 64 (01) : 29 - 41
  • [27] Machine Learning Evaluation of the Requirement Engineering Process Models for Cloud Computing and Security Issues
    Nadeem, Muhammad Asgher
    Lee, Scott Uk-Jin
    APPLIED SCIENCES-BASEL, 2020, 10 (17):
  • [28] Secure Information Systems development -: Based on a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
  • [29] Method Engineering Process Patterns
    Asadi, Mohsen
    Ramsin, Raman
    ISEC 2009 - PROCEEDINGS OF THE 2ND INDIA SOFTWARE ENGINEERING CONFERENCE, 2009, : 143 - 144
  • [30] Story based Mobile Application for Requirements Engineering Process
    Palamalai, Muthuraman
    Ahmad, Rodina
    Nizam, Mohd Hairul
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 303 - 307