A security mechanism for component-based systems

被引:0
|
作者
Grechanik, M [1 ]
Perry, DE [1 ]
Batory, D [1 ]
机构
[1] Univ Texas, Austin, TX 78712 USA
关键词
D O I
10.1109/ICCBSS.2006.3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security, scalability, and performance are critical for large-scale component-based applications. Weaving security solutions into the fabric of component-based architectures often worsens the scalability and performance of the resulting system. In this paper we analyze the sources of nonscalahility and conduct an empirical Study that shows that close to 80% of interactions between components and their clients in different commercial systems occur within protected security boundaries. Based on these findings we propose a novel scalable security mechanism for component-based systems called Component Adaptive Scalable Secure Infrastructure Architecture (CASSIA). CASSIA utilizes the topology of the security boundaries and patterns of interactions among components to achieve noticeable improvements in scalability and performance for component-based applications. We conduct a case Study that confirms the scalability of CASSIA, and propose a Secure COmponent Protocol (SCOP) that incorporates our mechanism into a component infrastructure.
引用
收藏
页码:53 / +
页数:2
相关论文
共 50 条
  • [1] An integrated security model for component-based systems
    Nissanke, Nimal
    [J]. ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3, 2007, : 638 - 645
  • [2] Assessing Security to Compare Architecture Alternatives of Component-Based Systems
    Busch, Axel
    Strittmatter, Misha
    Koziolek, Anne
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, : 99 - 108
  • [3] Security model oriented attestation on dynamically reconfigurable component-based systems
    Gu, Liang
    Bai, Guangdong
    Guo, Yao
    Chen, Xiangqun
    Mei, Hong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 974 - 981
  • [4] A process framework for characterising security properties of component-based software systems
    Khan, KM
    Han, J
    [J]. 2004 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 358 - 367
  • [5] Model-Driven Information Flow Security for Component-Based Systems
    Ben Said, Najah
    Abdellatif, Takoua
    Bensalem, Saddek
    Bozga, Marius
    [J]. FROM PROGRAMS TO SYSTEMS: THE SYSTEMS PERSPECTIVE IN COMPUTING, 2014, 8415 : 1 - +
  • [6] Security Countermeasure Selection for Component-Based Software-Intensive Systems
    Skandylas, Charilaos
    Khakpour, Narges
    Camara, Javier
    [J]. 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 63 - 72
  • [7] Component-based reconfigurable systems
    Lowry, MR
    [J]. COMPUTER, 1998, 31 (04) : 44 - +
  • [8] Testing of component-based systems
    Kanso, Bilal
    Aiguier, Marc
    Boulanger, Frederic
    Gaston, Christophe
    [J]. 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 2012, : 300 - 305
  • [9] Slicing component-based systems
    Pan, YJ
    Pan, D
    Chen, MH
    [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 155 - 164
  • [10] Engineering of component-based systems
    Brown, AW
    Wallnau, KC
    [J]. SECOND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS: HELD JOINTLY WITH 6TH CSESAW, 4TH IEEE RTAW, AND SES'96, 1996, : 414 - 422