Secure Component Based Applications Through Security Patterns

被引:6
|
作者
Bouaziz, Rahma [1 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
component based approach; Security pattern; UML profile; Model Driven Development;
D O I
10.1109/GreenCom.2012.123
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security patterns are widely studied in literature and have recently received a great deal of attention as means to capture practical solutions to meet specific requirements. Many security patterns have been proposed, but generally without guiding developers for their concrete application. In this paper, we propose a technique for integrating them using UML and its profiles. The contribution is an MDE process to build secure component based software applications.
引用
收藏
页码:749 / 754
页数:6
相关论文
共 50 条
  • [1] Applying Security Patterns for Component Based Applications Using UML Profile
    Bouaziz, Rahma
    Coulette, Bernard
    [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 186 - 193
  • [2] Building High Assurance Secure Applications using Security Patterns for Capability-Based Platforms
    Rimba, Paul
    [J]. PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 1401 - 1404
  • [3] Development of Applications Based on Security Patterns
    Serrano, Daniel
    Ruiz, Jose F.
    Munoz, Antonio
    Mana, Antonio
    Armenteros, Alvaro
    Crespo, Beatriz Gallego-Nicaso
    [J]. DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 111 - +
  • [4] A catalogue associating security patterns and attack steps to design secure applications
    Salva, Sebastien
    Regainia, Loukmen
    [J]. JOURNAL OF COMPUTER SECURITY, 2019, 27 (01) : 49 - 74
  • [5] A collaborative process for developing secure component based applications
    Bouaziz, Rahma
    Kallel, Slim
    Coulette, Bernard
    [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 306 - 311
  • [6] An Approach for Security Patterns Application in Component Based Models
    Bouaziz, Rahma
    Kallel, Slim
    Coulette, Bernard
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT V, 2014, 8583 : 283 - +
  • [7] Component-based development of secure mobile agents applications
    Moratalla, Alvaro
    Robles, Sergi
    [J]. MULTI-AGENT SYSTEMS AND APPLICATIONS V, PROCEEDINGS, 2007, 4696 : 113 - 122
  • [8] Security patterns and secure systems design
    Fernandez, Eduardo B.
    [J]. Dependable Computing, Proceedings, 2007, 4746 : 233 - 234
  • [9] An engineering process for security patterns application in component based models
    Bouaziz, Rahma
    Kallel, Slim
    Coulette, Bernard
    [J]. 2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 231 - 236
  • [10] Security patterns and requirements for internet-based applications
    Rosado, David G.
    Gutierrez, Carlos
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. INTERNET RESEARCH, 2006, 16 (05) : 519 - 536