An engineering process for security patterns application in component based models

被引:7
|
作者
Bouaziz, Rahma [1 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
Component; Component based systems; Security patterns; Process; Aspects; SPEM;
D O I
10.1109/WETICE.2013.27
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security engineering with patterns is currently a very active area of research. Security patterns - an adaptation of Design Patterns to security - capture experts' experience in order to solve recurrent security problems in a structured and reusable way. In this paper, our objective is to describe an engineering process, called SCRIP (SeCurity patteRn Integration Process), which provides guidelines for integrating security patterns into component-based models. SCRIP defines activities and products to integrate security patterns in the whole development process, from UML component modeling until aspect code generation. The definition of SCRIP has been made using the OMG standard Software and System Process Engineering Meta-model (SPEM). We are developing a CASE tool to support that process.
引用
收藏
页码:231 / 236
页数:6
相关论文
共 50 条
  • [31] Applying a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
  • [32] Story based Mobile Application for Requirements Engineering Process
    Palamalai, Muthuraman
    Ahmad, Rodina
    Nizam, Mohd Hairul
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 303 - 307
  • [33] Research on Security Requirements Engineering Process
    Wang, Hui
    Jia, Zongpu
    Shen, Zihao
    [J]. 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 1285 - 1288
  • [34] A Framework for Security Design Engineering Process
    Chatterjee, Kakali
    Gupta, Daya
    De, Asok
    [J]. COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 287 - +
  • [35] Guiding the application of design patterns based on UML models
    Briand, Lionel C.
    Labiche, Yvan
    Sauve, Alexandre
    [J]. ICSM 2006: 22ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2006, : 234 - +
  • [36] A process framework for characterising security properties of component-based software systems
    Khan, KM
    Han, J
    [J]. 2004 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 358 - 367
  • [37] Framework for Engineering Complex Security Requirements Patterns
    Mazo, Raul
    Feltus, Christophe
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
  • [38] An Application Security Model Based on Business Process in Information System
    Xu, Peng
    Chen, Meirong
    Feng, Lifang
    Wu, Guanfeng
    Ma, Fangli
    Wang, Danchen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
  • [39] Application of Component-Based Software Engineering in Building a Surveillance Robot
    More, Chaitali
    Colaco, Louella
    Sardinha, Razia
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 651 - 658
  • [40] Requirements Engineering Based on Business Process Models: A Case Study
    Souza Cardoso, Evellin Cristine
    Almeida, Joao Paulo A.
    Guizzardi, Giancarlo
    [J]. 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 320 - 327