An Approach for Security Patterns Application in Component Based Models

被引:0
|
作者
Bouaziz, Rahma [1 ,2 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
component based approach; Security pattern; RBAC; UML profile; Model Driven Development; DESIGN; INTEGRATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since applications have become increasingly complex and because the design of secure systems necessitates security expertise, security patterns are now widely used as guidelines proposed by security experts in order to solve a recurring security problem. In order to encourage application designers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns. We propose a full security pattern integration methodology from the earliest phases of software development until the generation of the application code. The proposed solution uses the UML component model as an application domain of security patterns and bases on the use of UML profiles and model transformations with the ATL language. For the generation of code and for keeping the separation between the functional code of the component based application and security solution, we use the aspect paradigm. An illustration of the proposed approach is provided using the Role Based Access Control (RBAC) pattern. A case study of GPS system is also provided to demonstrate the application of the proposed approach.
引用
收藏
页码:283 / +
页数:4
相关论文
共 50 条
  • [1] An engineering process for security patterns application in component based models
    Bouaziz, Rahma
    Kallel, Slim
    Coulette, Bernard
    2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 231 - 236
  • [2] Secure Component Based Applications Through Security Patterns
    Bouaziz, Rahma
    Coulette, Bernard
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 749 - 754
  • [3] Testing approach of component security based on fault injection
    Chen, Jinfu
    Lu, Yansheng
    Me, Xiaodong
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 763 - 767
  • [4] Applying Security Patterns for Component Based Applications Using UML Profile
    Bouaziz, Rahma
    Coulette, Bernard
    15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 186 - 193
  • [5] Component security - Issues and an approach
    Nissanke, N
    Proceedings of the 29th Annual International Computer Software and Applications Conference, Workshops and Fast Abstracts, 2005, : 152 - 155
  • [6] Security for XML messaging services - a component-based approach
    Komathy, K
    Ramachandran, V
    Vivekanandan, P
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2003, 26 (02) : 197 - 211
  • [7] Reviewing the Challenges of Security Features in Component Based Software Development Models
    Kahtan, Hasan
    Abu Bakar, Nordin
    Nordin, Rosmawati
    2012 IEEE SYMPOSIUM ON E-LEARNING, E-MANAGEMENT AND E-SERVICES (IS3E 2012), 2012, : 105 - 110
  • [8] Model-Driven Security Patterns Application Based on Dependences among Patterns
    Shiroma, Yuki
    Washizaki, Hironori
    Fukazawa, Yoshiaki
    Kubo, Atsuto
    Yoshioka, Nobukazu
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 555 - 559
  • [9] Security Based Multiple Bayesian Models Combination Approach
    Kishan, S. Ravi
    Rajesh, S.
    Swamy, B. N.
    Prasad, J. V. D.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (11): : 268 - 272
  • [10] COMPONENT SECURITY TESTING APPROACH BASED ON EXTENDED CHEMICAL ABSTRACT MACHINE
    Chen, Jinfu
    Lu, Yansheng
    Wang, Huanhuan
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2012, 22 (01) : 59 - 83