Design of Secure Software Architectures with Secure Connectors

被引:5
|
作者
Shin, Michael E. [1 ]
Gomaa, Hassan [2 ]
Pathirage, Don [1 ]
Baker, Chase [1 ]
Malhotra, Bhavya [3 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] George Mason Univ Fairfax, Dept Comp Sci, Fairfax, VA 22030 USA
[3] Compass Learning, 6607 Brodie Lane, Austin, TX 78745 USA
关键词
Secure connector; secure software architecture; component-based software architecture; secure software design; communication patterns;
D O I
10.1142/S021819401650025X
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes the design of secure connectors that are used in the design of secure software architectures for distributed business applications. Mixing security concerns with business concerns in software architectures makes applications more complex. With the goal of making secure software architectures more maintainable and evolvable, the secure connectors proposed in this paper are designed separately from business application components by considering different communication patterns between the components as well as security services required by application components. Each secure connector encapsulates security relevant objects to provide application components with security services. In this paper, secure connectors are applied to design the software architectures of electronic commerce and automated teller machine applications.
引用
收藏
页码:769 / 805
页数:37
相关论文
共 50 条
  • [21] Conficker: Lessons in Secure Software and System Design
    Sanders, Aaron D.
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (02): : 95 - 99
  • [22] An automation framework design for secure software development
    Mythily, M.
    Valarmathi, M. L.
    Durai, C. Anand Deva
    Rexie, J. A. M.
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2019, 31 (10)
  • [23] Secure spiral: A secure software development model
    [J]. Kaur, P, 1600, Academic Journals Inc., 244, 5th avenue, No. 2218, New City, NY 10001, United States (06):
  • [24] The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach
    van Niekerk, Johan
    Futcher, Lynn
    [J]. INFORMATION SECURITY EDUCATION ACROSS THE CURRICULUM, WISE 9, 2015, 453 : 75 - 83
  • [25] Secure Software Development Model: A Guide for Secure Software Life Cycle
    Daud, Malik Imran
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 724 - 728
  • [26] Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design
    Shropshire, Jordan
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 5008 - 5017
  • [27] Special Session on Architectures and Design Tools for Secure Embedded Systems
    [J]. INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION (SAMOS 2017), 2017, : 245 - 245
  • [28] Modeling Fault Tolerant Architectures with Design Diversity for Secure Systems
    Rodriguez, Manuel
    Kwiat, Kevin A.
    Kamhoua, Charles A.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1254 - 1263
  • [29] Secure Boot for Reconfigurable Architectures
    Siddiqui, Ali Shuja
    Gui, Yutian
    Saqib, Fareena
    [J]. CRYPTOGRAPHY, 2020, 4 (04) : 1 - 15
  • [30] Requirements and Architectures for Secure Vehicles
    Whalen, Michael W.
    Cofer, Darren
    Gacek, Andrew
    [J]. IEEE SOFTWARE, 2016, 33 (04) : 22 - 25