Security patterns and secure systems design

被引:0
|
作者
Fernandez, Eduardo B. [1 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci & Engn, Boca Raton, FL 33431 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analysis and design patterns are well established to build high-quality object-oriented software. Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for-secure system design and evaluation. They are being adopted by companies such as IBM, Sun, and Microsoft. We show the anatomy of a security pattern, a variety of them, and their use in the construction of secure systems. These patterns include Authentication, Authorization, Role-based Access Control, Firewalls, Web Services Security (SAML, XACML, XML Firewall), and others. We apply these patterns through a secure system development method based on a hierarchical architecture whose layers define the scope of each security mechanism. First, the possible attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class model. We then define additional security constraints that apply to distribution, interfaces, and components. The patterns are shown using UML models and some examples are taken from my book "Security Patterns" (Wiley 2006).
引用
收藏
页码:233 / 234
页数:2
相关论文
共 50 条
  • [41] A Review Paper : Security Requirement Patterns for a Secure Software Development
    Yahya, Syazwani
    Kamalrudin, Massila
    Sidek, Safiah
    Jaimun, Munaliza
    Yusof, Junaidah
    Hua, Ang Kean
    Gani, Paran
    [J]. 2019 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA SCIENCES (AIDAS2019), 2019, : 146 - 151
  • [42] Use of Security Patterns for Development of Secure Healthcare Information System
    Maher, Zulfikar Ahmed
    Sani, Nor Fazlida Mohd
    Din, Jamilah
    Jabar, Marzanah A.
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2016, 6 (06) : 1541 - 1547
  • [43] Security by Design factors for developing and evaluating secure software
    de la Camara, Mercedes
    Javier Saenz, Fco.
    Antonio Calvo-Manzano, Jose
    Arcilla, Magdalena
    [J]. 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
  • [44] Applying The Flask Security Architecture to Secure SoC Design
    Hategekimana, Festus
    Bobda, Christophe
    [J]. 2017 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2017), 2017, : 198 - 198
  • [45] Design and implementation of integrated security engine for secure networking
    Kim, JN
    Lee, KS
    Lee, CH
    [J]. 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 480 - 484
  • [46] Design and implementation of secure Linux kernel security functions
    Shi, W.C.
    Sun, Y.F.
    Liang, H.L.
    Zhang, X.F.
    Zhao, Q.S.
    Shan, Z.Y.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (10):
  • [47] Security services architecture for Secure Mobile Grid Systems
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Lopez, Javier
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (03) : 240 - 258
  • [48] Security design patterns:: Survey and evaluation
    Laverdiere, M-A.
    Mourad, A.
    Hanna, A.
    Debbabi, M.
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 2086 - +
  • [49] SYSTEMS OF SECURE PAYMENT. SECURITY IN ELECTRONIC COMMERCE
    Martinez Lopez, Luis
    Mata Mata, Francisco
    Rodriguez Dominguez, Rosa Ma
    [J]. REVISTA DE ESTUDIOS EMPRESARIALES-SEGUNDA EPOCA, 2009, (01): : 63 - 76
  • [50] Towards Design Patterns for Production Security
    Hoffmann, David
    Biffl, Stefan
    Meixner, Kristof
    Lueder, Arndt
    [J]. 2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,