An architecture for security-oriented perfective maintenance of legacy software

被引:2
|
作者
Cotroneo, D [1 ]
Mazzeo, A [1 ]
Romano, L [1 ]
Russo, S [1 ]
机构
[1] Univ Naples Federico II, I-80125 Naples, Italy
关键词
security; perfective maintenance; legacy software; CORBA; replication;
D O I
10.1016/S0950-5849(03)00049-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents an implementation strategy which exploits the separation of concerns and reuse in a multi-tier architecture to improve the security (availability, integrity, and confidentiality) level of an existing application. Functional properties are guaranteed via wrapping of the existing software modules. Security mechanisms are handled by the business logic of the middle-tier: availability and integrity are achieved via replication of the functional modules and the confidentiality is obtained via cryptography. The technique is presented with regard to a case study application. We believe that our experience can be used as a guideline for software practitioners to solve similar problems. We thus describe the conceptual model behind the architecture, discuss implementation issues, and present technical solutions. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:619 / 631
页数:13
相关论文
共 50 条
  • [1] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] Security-Oriented Architecture for Managing IoT Deployments
    Zuquete, Andre
    Gomes, Helder
    Amaral, Joao
    Oliveira, Carlos
    [J]. SYMMETRY-BASEL, 2019, 11 (10):
  • [3] Research on content security-oriented packet parsing architecture
    Dong, Yong-Ji
    Guo, Yun-Fei
    Huang, Hui-Qun
    Huang, Wan-Wei
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (05): : 130 - 135
  • [4] Integrating legacy software into a service oriented architecture
    Sneed, Harry M.
    [J]. 10TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 2006, : 3 - +
  • [5] Security-oriented service composition and evolution
    Han, Jun
    Kowalczyk, Ryszard
    Khan, Khaled M.
    [J]. ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 71 - 78
  • [6] SOFTWARE PERFECTIVE MAINTENANCE - INCLUDING RETRAINABLE SOFTWARE IN SOFTWARE REUSE
    RINE, D
    [J]. INFORMATION SCIENCES, 1993, 75 (1-2) : 109 - 132
  • [7] A quantitative comparison of perfective and corrective software maintenance
    Henry, JE
    Cain, JP
    [J]. JOURNAL OF SOFTWARE MAINTENANCE-RESEARCH AND PRACTICE, 1997, 9 (05): : 281 - 297
  • [8] On some directions in security-oriented research
    Sekanina, Lukas
    Hruska, Tomas
    Vojnar, Tomas
    Kolar, Dusan
    Cernocky, Jan
    [J]. 2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 141 - +
  • [9] Achieving agility in adaptive and perfective software maintenance
    Prakash, Gouri
    [J]. 14TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR 2010), 2010, : 61 - 62
  • [10] Improving Perimeter Security with Security-oriented Program Transformations
    Hafiz, Munawar
    Johnson, Ralph E.
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 61 - 67