Applying Security Patterns for Component Based Applications Using UML Profile

被引:7
|
作者
Bouaziz, Rahma [1 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
关键词
component based approach; Security pattern; UML profile; Model Driven Development;
D O I
10.1109/ICCSE.2012.104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's systems require a higher consideration for non functional requirements as security and dependability. Developers have to handle these requirements during software development lifecycle. To provide developers with security guidelines, security patterns were proposed. These patterns are a collection of experts' security knowledge and a good solution to convey security concepts. In order to encourage developers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns using UML profiles. In this paper, we propose a structured UML profiles construction process based on security patterns. An illustration of the proposed process is provided using the "active replication" pattern. A case study of GPS system is also provided to demonstrate the application of generated UML profile using the proposed process.
引用
收藏
页码:186 / 193
页数:8
相关论文
共 50 条
  • [41] Behavioral Patterns in Security Applications
    Ogiela, Marek R.
    Ogiela, Lidia
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATICS AND BIOMEDICAL SCIENCES (ICIIBMS), 2017, : 122 - 125
  • [42] Towards practical security monitors of UML policies for mobile applications
    Massacci, Fabio
    Naliuka, Katsiaryna
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1112 - 1119
  • [43] The Reality of Applying Security in Web Applications in Education
    Al-Ibrahim, Mohamed
    Al-Deen, Yousef Shams
    [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 997 - 1001
  • [44] Enforcing Component Dependency in UML Deployment Diagram for Cloud Applications
    Mohammadi, Reza Gorgan
    Barforoush, Ahmad Abdollahzadeh
    [J]. 2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 412 - 417
  • [45] The Reality of Applying Security in Web Applications in Academia
    Al-Ibrahim, Mohamed
    Al-Deen, Yousef Shams
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (10) : 7 - 15
  • [46] Using UML-based feature models and UML collaboration diagrams to information modelling for web-based applications
    Dolog, P
    Nejdl, W
    [J]. UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 425 - 439
  • [47] A proposal for goal modelling using a UML profile
    Grangel, Reyes
    Chalmeta, Ricardo
    Campos, Cristina
    Sommar, Ruth
    Bourey, Jean-Pierre
    [J]. ENTERPRISE INTEROPERABILITY III: NEW CHALLENGES AND INDUSTRIAL APPROACHES, 2008, : 679 - +
  • [48] A UML profile for agent-based development
    Zeid, A
    [J]. METAINFORMATICS, 2002, 2641 : 161 - 170
  • [49] Refinement Based Modeling of Workflow Applications using UML Activity Diagrams
    Ben Younes, Ahlem
    Hlaoui, Yousra Bendaly
    Ben Ayed, Leila Jemni
    Jlassi, Rahma
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 187 - 192
  • [50] Introducing UML profile for modelling information architecture of Web applications
    Farooque, A
    Zhang, L
    Rashid, A
    [J]. PROCEEDINGS OF THE 11TH JOINT INTERNATIONAL COMPUTER CONFERENCE, 2005, : 245 - 250