Reusable Secure Connectors for Secure Software Architecture

被引:3
|
作者
Shin, Michael [1 ]
Gomaa, Hassan [2 ]
Pathirage, Don [1 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Lubbock, TX 79409 USA
[2] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
关键词
Reusable secure connector; Secure software architecture; Component-based software architecture; Secure software design; Message communication patterns; Dynamic modeling;
D O I
10.1007/978-3-319-35122-3_13
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper describes the design of reusable secure connectors that are used in the design of secure software architectures for distributed software applications. The secure connectors are designed separately from application components by reusing the appropriate communication pattern between components as well as the security services required by these components. Each secure connector is designed as a composite component that encapsulates both security service components and communication pattern components. Integration of security services and communication patterns within a secure connector is provided by a security coordinator. The main advantage is that secure connectors can be reused in different applications. In this paper, secure connectors are reused in electronic commerce and automated teller machine applications.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 50 条
  • [21] A Software Product Line Approach to Design Secure Connectors in Component-Based Software Architectures
    Shin, Michael
    Gomaa, Hassan
    Pathirage, Don
    [J]. SOFTWARE TECHNOLOGIES, ICSOFT 2018, 2019, 1077 : 372 - 396
  • [22] Secure spiral: A secure software development model
    [J]. Kaur, P., 1600, Academic Journals Inc., 244, 5th avenue, No. 2218, New City, NY 10001, United States (06):
  • [23] Secure communication channel architecture for Software Defined Mobile Networks
    Liyanage, Madhusanka
    Braeken, An
    Jurcut, Anca Delia
    Ylianttila, Mika
    Gurtov, Andrei
    [J]. COMPUTER NETWORKS, 2017, 114 : 32 - 50
  • [24] The software architecture of a secure and efficient group key agreement protocol
    Hong, Sunghyuck
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 274 - 278
  • [25] A Drone Secure Handover Architecture validated in a Software in the Loop Environment
    Vasconcelos Filho, Enio
    Gomes, Filipe
    Monteiro, Stephane
    Severino, Ricardo
    Penna, Sergio
    Koubaa, Anis
    Tovar, Eduardo
    [J]. 12TH EASN INTERNATIONAL CONFERENCE ON "INNOVATION IN AVIATION & SPACE FOR OPENING NEW HORIZONS", 2023, 2526
  • [26] Designing Secure Architecture of Health Software using Agile Practices
    Pirker, Alexander
    Lechner, Nadica Hrgarek
    [J]. CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS (CECIIS 2019), 2019, : 269 - 280
  • [27] ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices
    Asokan, N.
    Nyman, Thomas
    Rattanavipanon, Norrathep
    Sadeghi, Ahmad-Reza
    Tsudik, Gene
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (11) : 2290 - 2300
  • [28] A High Performance Software Architecture for a Secure Internet Routing PKI
    Reynolds, Mark C.
    Kent, Stephen
    [J]. CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 49 - 53
  • [29] Software Architecture of a Secure Multimedia System Using a Multicore SoC and Software Virtualization
    Kondol, Hiroyuki
    Yamamoto, Osamu
    Otani, Sugako
    Sugai, Naoto
    Shimizu, Toru
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2009, : 217 - +
  • [30] Secure Software Development Model: A Guide for Secure Software Life Cycle
    Daud, Malik Imran
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 724 - 728