Design of Secure Software Architectures with Secure Connectors

被引:5
|
作者
Shin, Michael E. [1 ]
Gomaa, Hassan [2 ]
Pathirage, Don [1 ]
Baker, Chase [1 ]
Malhotra, Bhavya [3 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] George Mason Univ Fairfax, Dept Comp Sci, Fairfax, VA 22030 USA
[3] Compass Learning, 6607 Brodie Lane, Austin, TX 78745 USA
关键词
Secure connector; secure software architecture; component-based software architecture; secure software design; communication patterns;
D O I
10.1142/S021819401650025X
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
引用
收藏
页码:769 / 805
页数:37
相关论文
共 50 条
  • [1] A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures
    Shin, Michael
    Gomaa, Hassan
    Pathirage, Don
    [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2018, 2019, 1077 : 372 - 396
  • [2] Reusable Secure Connectors for Secure Software Architecture
    Shin, Michael
    Gomaa, Hassan
    Pathirage, Don
    [J]. SOFTWARE REUSE: BRIDGING WITH SOCIAL-AWARENESS, 2016, 9679 : 181 - 196
  • [3] Secure software Architectures design by aspect orientation
    Yu, HQ
    Liu, DM
    He, XD
    Yang, L
    Gao, S
    [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 47 - 55
  • [4] Secure Software Architectural Patterns Designed with Secure Connectors
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 484 - 491
  • [5] Secure software architectures
    Moriconi, M
    Qian, XL
    Riemenschneider, RA
    Gong, L
    [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 84 - 93
  • [6] Design of Secure Connectors for Complex Message Communications in Software Architecture
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    [J]. ESSE 2021: THE 2ND EUROPEAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2021, : 21 - 28
  • [7] Design and evaluation of secure software architectures for web applications
    Ambrose, Jude Angelo
    Petkov, Emil
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2006, : 365 - 370
  • [8] Threat-Driven Design and Analysis of Secure Software Architectures
    Xu, Dianxiang
    Pauli, Joshua J.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 171 - 180
  • [9] A formal approach to designing secure software architectures
    Yu, HQ
    He, XD
    Deng, Y
    Mo, L
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 289 - 290
  • [10] Industry 4.0 needs secure Software Architectures
    不详
    [J]. ATP EDITION, 2015, (03): : 7 - 7