An engineering process for security patterns application in component based models

被引:7
|
作者
Bouaziz, Rahma [1 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
Component; Component based systems; Security patterns; Process; Aspects; SPEM;
D O I
10.1109/WETICE.2013.27
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security engineering with patterns is currently a very active area of research. Security patterns - an adaptation of Design Patterns to security - capture experts' experience in order to solve recurrent security problems in a structured and reusable way. In this paper, our objective is to describe an engineering process, called SCRIP (SeCurity patteRn Integration Process), which provides guidelines for integrating security patterns into component-based models. SCRIP defines activities and products to integrate security patterns in the whole development process, from UML component modeling until aspect code generation. The definition of SCRIP has been made using the OMG standard Software and System Process Engineering Meta-model (SPEM). We are developing a CASE tool to support that process.
引用
收藏
页码:231 / 236
页数:6
相关论文
共 50 条
  • [31] Applying a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 192 - 206
  • [32] Research on Security Requirements Engineering Process
    Wang, Hui
    Jia, Zongpu
    Shen, Zihao
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 1285 - 1288
  • [33] A Framework for Security Design Engineering Process
    Chatterjee, Kakali
    Gupta, Daya
    De, Asok
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 287 - +
  • [34] Guiding the application of design patterns based on UML models
    Briand, Lionel C.
    Labiche, Yvan
    Sauve, Alexandre
    ICSM 2006: 22ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2006, : 234 - +
  • [35] A process framework for characterising security properties of component-based software systems
    Khan, KM
    Han, J
    2004 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 358 - 367
  • [36] Application of Component-Based Software Engineering in Building a Surveillance Robot
    More, Chaitali
    Colaco, Louella
    Sardinha, Razia
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 651 - 658
  • [37] An Application Security Model Based on Business Process in Information System
    Xu, Peng
    Chen, Meirong
    Feng, Lifang
    Wu, Guanfeng
    Ma, Fangli
    Wang, Danchen
    2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
  • [38] Framework for Engineering Complex Security Requirements Patterns
    Mazo, Raul
    Feltus, Christophe
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 250 - 254
  • [39] Requirements Engineering Based on Business Process Models: A Case Study
    Souza Cardoso, Evellin Cristine
    Almeida, Joao Paulo A.
    Guizzardi, Giancarlo
    2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 320 - 327
  • [40] Towards a Process Patterns based Approach for Promoting Adaptability in Configurable Process Models
    Sbai, Hanae
    Fredj, Mounia
    Kjiri, Laila
    ICEIS: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 3, 2013, : 382 - 387