Applying Security Patterns for Component Based Applications Using UML Profile

被引:7
|
作者
Bouaziz, Rahma [1 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
component based approach; Security pattern; UML profile; Model Driven Development;
D O I
10.1109/ICCSE.2012.104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's systems require a higher consideration for non functional requirements as security and dependability. Developers have to handle these requirements during software development lifecycle. To provide developers with security guidelines, security patterns were proposed. These patterns are a collection of experts' security knowledge and a good solution to convey security concepts. In order to encourage developers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns using UML profiles. In this paper, we propose a structured UML profiles construction process based on security patterns. An illustration of the proposed process is provided using the "active replication" pattern. A case study of GPS system is also provided to demonstrate the application of generated UML profile using the proposed process.
引用
收藏
页码:186 / 193
页数:8
相关论文
共 50 条
  • [31] UML Profile for Specifying User Interfaces of Business Applications
    Perisic, Branko
    Milosavljevic, Gordana
    Dejanovic, Igor
    Milosavljevic, Branko
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (02) : 405 - 426
  • [32] Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns
    Zapata-Barra, Matias
    Rodriguez, Alfonso
    Caro, Angelica
    Fernandez, Eduardo B.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 24 (10) : 1472 - 1492
  • [33] Defining patterns using UML proffies
    Debnath, N. C.
    Garis, A.
    Riesco, D.
    Montejano, G.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 1146 - +
  • [34] An UML profile for representing real-time design patterns
    Marouane, Hela
    Duvallet, Claude
    Makni, Achraf
    Bouaziz, Rafik
    Sadeg, Bruno
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (04) : 478 - 497
  • [35] Leveraging patterns on domain models to improve UML profile definition
    Lagarde, Francois
    Espinoza, Huascar
    Terrier, Francois
    Andre, Charles
    Gerard, Sebastien
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2008, 4961 : 116 - +
  • [36] A UML Profile for Documenting the Component-and-Connector Views of Software Architectures
    Adrian Anacleto, Valerio
    [J]. JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2008, 8 (01): : 21 - 26
  • [37] New applications of security patterns
    不详
    [J]. SECURITY ENGINEERING WITH PATTERNS: ORIGINS, THEROETICAL MODEL, AND NEW APPLICATIONS, 2003, 2754 : 141 - 159
  • [38] Building High Assurance Secure Applications using Security Patterns for Capability-Based Platforms
    Rimba, Paul
    [J]. PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 1401 - 1404
  • [39] Towards practical security monitors of UML policies for mobile applications
    Massacci, Fabio
    Naliuka, Katsiaryna
    [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 278 - 278
  • [40] Model-based security engineering with UML
    Jürjens, J
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 42 - 77