Security patterns and secure systems design

被引:0
|
作者
Fernandez, Eduardo B. [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci & Engn, Boca Raton, FL 33431 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analysis and design patterns are well established to build high-quality object-oriented software. Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for-secure system design and evaluation. They are being adopted by companies such as IBM, Sun, and Microsoft. We show the anatomy of a security pattern, a variety of them, and their use in the construction of secure systems. These patterns include Authentication, Authorization, Role-based Access Control, Firewalls, Web Services Security (SAML, XACML, XML Firewall), and others. We apply these patterns through a secure system development method based on a hierarchical architecture whose layers define the scope of each security mechanism. First, the possible attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class model. We then define additional security constraints that apply to distribution, interfaces, and components. The patterns are shown using UML models and some examples are taken from my book "Security Patterns" (Wiley 2006).
引用
收藏
页码:233 / 234
页数:2
相关论文
共 50 条
  • [1] Abstract security patterns and the design of secure systems
    Fernandez, Eduardo B.
    Yoshioka, Nobukazu
    Washizaki, Hironori
    Yoder, Joseph
    [J]. CYBERSECURITY, 2022, 5 (01)
  • [2] Abstract security patterns and the design of secure systems
    Eduardo B. Fernandez
    Nobukazu Yoshioka
    Hironori Washizaki
    Joseph Yoder
    [J]. Cybersecurity, 5
  • [3] Secure Design Patterns for Security in Smart Metering Systems
    Ur-Rehman, Obaid
    Zivic, Natasa
    [J]. UKSIM-AMSS NINTH IEEE EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2015), 2015, : 278 - 283
  • [4] SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems
    Nguyen, Phu H.
    Yskout, Koen
    Heyman, Thomas
    Klein, Jacques
    Scandariato, Riccardo
    Le Traon, Yves
    [J]. 2015 ACM/IEEE 18TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS), 2015, : 246 - 255
  • [5] Designing Secure SCADA Systems Using Security Patterns
    Fernandez, Eduardo B.
    Larrondo-Petrie, Maria M.
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 909 - 916
  • [6] Analysis of Application of Security Patterns to Build Secure Systems
    Ortiz, Roberto
    Garzas, Javier
    Fernandez-Medina, Eduardo
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, 2011, 83 : 652 - +
  • [7] Enhancing secure business process design with security process patterns
    Argyropoulos, Nikolaos
    Mouratidis, Haralambos
    Fish, Andrew
    [J]. SOFTWARE AND SYSTEMS MODELING, 2020, 19 (03): : 555 - 577
  • [8] Enhancing secure business process design with security process patterns
    Nikolaos Argyropoulos
    Haralambos Mouratidis
    Andrew Fish
    [J]. Software and Systems Modeling, 2020, 19 : 555 - 577
  • [9] Design of secure operating systems with high security levels
    Qing Sihan
    Shen ChangXiang
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 399 - 418
  • [10] Design of secure operating systems with high security levels
    QING SiHan1
    2 School of Software and Microelectronics
    3 Institute of Computing Technology
    [J]. Science China(Information Sciences), 2007, (03) : 399 - 418