Security patterns and requirements for internet-based applications

被引:19
|
作者
Rosado, David G. [1 ]
Gutierrez, Carlos [1 ]
Fernandez-Medina, Eduardo [1 ]
Piattini, Mario [1 ]
机构
[1] Univ Castilla La Mancha, Escuela Super Informat, ALARCOS Res Grp,Informat Syst & Technol Dept, UCLM Soluziona Res & Dev Inst, E-13071 Ciudad Real, Spain
关键词
worldwide web; security products; computer applications;
D O I
10.1108/10662240610710996
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - The purpose of this paper is that of linking security requirements for web services with security patterns, both at the architectural and the design level, obtaining in a systematic way a web services security software architecture that contains a set of security patterns, thus ensuring that the security requirements of the internet-based application that have been elicited are fulfilled. Additionally, the security patterns are linked with the most appropriate standards for their implementation. Design/methodology/approach - To develop secure WS-based applications, one must know the main security requirements specified that applications have to fulfil and find appropriate security patterns that assure, through combination or relationships between them, the fulfilment of the implicated security requirements. That is why a possible link or connection between requirements and patterns will have to be found, attempting to select for a determined security requirement the best security patterns that solve this requirement, thus guaranteeing the security properties for internet-based applications. Findings - Using security patterns, that drive and guide one towards a secure development as well as towards security software architecture, one can be sure that this design based on these patterns fulfils and guarantees the most important security requirements of the internet-based applications through the design and implementation of security solutions that provide reliable security services. Practical implications - Security architecture for internet-based applications and web services can be designed considering the security requirement types that it must fulfil and using the most appropriate security patterns. Originality/value - This paper proposes a relationship between security requirements that can be specified for internet-based applications and the possible security patterns that can be used in the design and implementation of the secure system based on the internet, guaranteeing that these security requirements are fulfilled.
引用
收藏
页码:519 / 536
页数:18
相关论文
共 50 条
  • [1] Research of security for Internet-based EDI
    Ju, Chun-Hua
    Ling, Yun
    Wang, Guang-Ming
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (11):
  • [2] Integrated Security Model for Managing the Security Non-Functional Requirements at Architectural Design of Internet-Based Systems
    Babar, Muhammad
    Azeem, Shahid
    Arif, Fahim
    Iqbal, Waseem
    [J]. 2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 41 - 46
  • [3] Security of RFID Based Internet of Things Applications: Requirements and Open Issues
    Chamekh, Marwa
    Hamdi, Mohamed
    El Asmi, Sadok
    Kim, Tai-Hoon
    [J]. 2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 699 - 703
  • [4] Cyber security in internet-based multiplayer gaming
    Dixon, Christopher
    Wahsheh, Luay A.
    [J]. IAENG International Journal of Computer Science, 2010, 37 (04)
  • [5] Security issues for Internet-based calibration activities
    Carullo, A
    Parvis, M
    Vallan, A
    [J]. IMTC 2002: PROCEEDINGS OF THE 19TH IEEE INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE, VOLS 1 & 2, 2002, : 817 - 822
  • [6] Development of Internet-based multimedia applications
    Quinn, GB
    Taylor, A
    Wang, HP
    Bourne, PE
    [J]. TRENDS IN BIOCHEMICAL SCIENCES, 1999, 24 (08) : 321 - 324
  • [7] Can Internet-based applications be engineered?
    Pressman, RS
    [J]. IEEE SOFTWARE, 1998, 15 (05) : 104 - 110
  • [8] Ensure the safety and security of internet-based control systems
    Yang, L
    Yang, SH
    [J]. MEASUREMENT & CONTROL, 2005, 38 (01): : 22 - 26
  • [9] Internet-based security incidents and the potential for false alarms
    Evans, MP
    Furnell, SM
    [J]. INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 2000, 10 (03): : 238 - 245
  • [10] Internet-Based Communications: A Threat or Strength to National Security?
    Asogwa, Chika Euphemia
    [J]. SAGE OPEN, 2020, 10 (02):