Reusable Secure Connectors for Secure Software Architecture

被引:3
|
作者
Shin, Michael [1 ]
Gomaa, Hassan [2 ]
Pathirage, Don [1 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
关键词
Reusable secure connector; Secure software architecture; Component-based software architecture; Secure software design; Message communication patterns; Dynamic modeling;
D O I
10.1007/978-3-319-35122-3_13
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper describes the design of reusable secure connectors that are used in the design of secure software architectures for distributed software applications. The secure connectors are designed separately from application components by reusing the appropriate communication pattern between components as well as the security services required by these components. Each secure connector is designed as a composite component that encapsulates both security service components and communication pattern components. Integration of security services and communication patterns within a secure connector is provided by a security coordinator. The main advantage is that secure connectors can be reused in different applications. In this paper, secure connectors are reused in electronic commerce and automated teller machine applications.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 50 条
  • [1] Design of Secure Software Architectures with Secure Connectors
    Shin, Michael E.
    Gomaa, Hassan
    Pathirage, Don
    Baker, Chase
    Malhotra, Bhavya
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2016, 26 (05) : 769 - 805
  • [2] Design of Secure Connectors for Complex Message Communications in Software Architecture
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    [J]. ESSE 2021: THE 2ND EUROPEAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2021, : 21 - 28
  • [3] Secure Software Architectural Patterns Designed with Secure Connectors
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 484 - 491
  • [4] A Secure and Reusable Software Architecture for Supporting Online Data Harmonization
    Feric, Zlatan
    Agostini, Nicolas Bohm
    Beene, Daniel
    Signes-Pastor, Antonio J.
    Halchenko, Yuliya
    Watkins, Deborah
    MacKenzie, Debra
    Karagas, Margaret
    Manjourides, Justin
    Alshawabkeh, Akram
    Kaeli, David
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 2801 - 2812
  • [5] ON THE ARCHITECTURE OF SECURE SOFTWARE DEFINED RADIOS
    Davidson, John A.
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 2704 - 2710
  • [6] An Architecture for Secure Software Defined Radio
    Li, Chunxiao
    Raghunathan, Anand
    Jha, Niraj K.
    [J]. DATE: 2009 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2009, : 448 - +
  • [7] Adaptive secure software architecture for electronic commerce
    Tak, SW
    Park, EK
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (14): : 1343 - 1357
  • [8] Trusting software tools in a secure DRM architecture
    Torres, Victor
    Delgado, Jaime
    Llorente, Silvia
    [J]. AXMEDIS 2007: THIRD INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2007, : 55 - +
  • [9] Development of a secure communication architecture for software agents
    Saenchai, K
    Benedicenti, L
    [J]. WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVII, PROCEEDINGS: CYBERNETICS AND INFORMATICS: CONCEPTS AND APPLICATIONS (PT II), 2001, : 528 - 530
  • [10] Robust, secure Ethernet connectors
    不详
    [J]. HYDROCARBON PROCESSING, 2000, 79 (12): : 37 - 37