Applying Security Patterns for Component Based Applications Using UML Profile

被引:7
|
作者
Bouaziz, Rahma [1 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
component based approach; Security pattern; UML profile; Model Driven Development;
D O I
10.1109/ICCSE.2012.104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's systems require a higher consideration for non functional requirements as security and dependability. Developers have to handle these requirements during software development lifecycle. To provide developers with security guidelines, security patterns were proposed. These patterns are a collection of experts' security knowledge and a good solution to convey security concepts. In order to encourage developers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns using UML profiles. In this paper, we propose a structured UML profiles construction process based on security patterns. An illustration of the proposed process is provided using the "active replication" pattern. A case study of GPS system is also provided to demonstrate the application of generated UML profile using the proposed process.
引用
收藏
页码:186 / 193
页数:8
相关论文
共 50 条
  • [1] Secure Component Based Applications Through Security Patterns
    Bouaziz, Rahma
    Coulette, Bernard
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 749 - 754
  • [2] Designing component-based frameworks - Using patterns in the UML
    Larsen, G
    [J]. COMMUNICATIONS OF THE ACM, 1999, 42 (10) : 38 - 45
  • [3] Applying Security Patterns for authorization of users in IoT Based Applications
    Ali, Ishfaq
    Asif, Muhammad
    [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING & EMERGING TECHNOLOGIES (ICEET), 2018, : 77 - 81
  • [4] Characterising Embedded Applications using a UML Profile
    Maatta, Sanna
    Indrusiak, Leandro Soares
    Ost, Luciano
    Moller, Leandro
    Glesner, Manfred
    Moraest, Fernando Gehm
    Nurmi, Jari
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON SYSTEM-ON-CHIP PROCEEDINGS, 2009, : 172 - +
  • [5] UML Profile for IoT-Based Applications
    Ltaief, Malek
    Toman, Sarah Hussein
    Hamel, Lazhar
    [J]. ADVANCES IN COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2022, 2022, 1653 : 515 - 527
  • [6] Support Formal Component-based Development with UML Profile
    Li, Dan
    Li, Xiaoshan
    Liu, Zhiming
    Stolz, Volker
    [J]. 2013 22ND AUSTRALASIAN CONFERENCE ON SOFTWARE ENGINEERING (ASWEC), 2013, : 191 - 200
  • [7] Security requirement with a UML 2.0 profile
    Rodriguez, Alfonso
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 670 - +
  • [8] Understanding Web Applications Using Component Based Visual Patterns
    Cosma, Dan C.
    Mihancea, Petru F.
    [J]. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION ICPC 2015, 2015, : 281 - 284
  • [9] Visualizing design patterns with a UML profile
    Dong, J
    Yang, S
    [J]. 200S IEEE SYMPOSIUM ON HUMAN CENTRIC COMPUTING LANGUAGES AND ENVIRONMENTS, 2003, : 123 - 125
  • [10] Applying the UML performance profile: Graph grammar-based derivation of LQN models from UML specifications
    Petriu, DC
    Shen, H
    [J]. COMPUTER PERFORMANCE EVALUATION: MODELLING TECHNIQUES AND TOOLS, 2002, 2324 : 159 - 177