An Approach for Security Patterns Application in Component Based Models

被引:0
|
作者
Bouaziz, Rahma [1 ,2 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
component based approach; Security pattern; RBAC; UML profile; Model Driven Development; DESIGN; INTEGRATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since applications have become increasingly complex and because the design of secure systems necessitates security expertise, security patterns are now widely used as guidelines proposed by security experts in order to solve a recurring security problem. In order to encourage application designers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns. We propose a full security pattern integration methodology from the earliest phases of software development until the generation of the application code. The proposed solution uses the UML component model as an application domain of security patterns and bases on the use of UML profiles and model transformations with the ATL language. For the generation of code and for keeping the separation between the functional code of the component based application and security solution, we use the aspect paradigm. An illustration of the proposed approach is provided using the Role Based Access Control (RBAC) pattern. A case study of GPS system is also provided to demonstrate the application of the proposed approach.
引用
收藏
页码:283 / +
页数:4
相关论文
共 50 条
  • [21] A component-based approach to verification and validation of formal software models
    Desovski, Dejan
    Cukic, Bojan
    ARCHITECTING DEPENDABLE SYSTEMS IV, 2007, 4615 : 89 - +
  • [22] Measurement Models of Information Security Based on the Principles and Practices for Risk-Based Approach
    Hoffmann, Romuald
    Napiorkowski, Jaroslaw
    Protasowicki, Tomasz
    Stanik, Jerzy
    1ST INTERNATIONAL CONFERENCE ON OPTIMIZATION-DRIVEN ARCHITECTURAL DESIGN (OPTARCH 2019), 2020, 44 : 647 - 654
  • [23] Comparative Approach to Cloud Security Models
    Rohini, Temkar
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 170 - 177
  • [24] An Approach to Designing a Network Security-based Application for Communications Safety
    Bruce, Ndibanje
    Kang, Young Jin
    Sain, Mangal
    Lee, Hoon Jae
    PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), 2015, : 1002 - 1009
  • [25] A novel approach for component based application logic event attack modeling
    Nabi, Faisal
    Yong, Jianming
    Tao, Xiaohui
    International Journal of Network Security, 2020, 22 (03) : 437 - 443
  • [26] TRUST BASED GRID SECURITY AND SECURITY MODELS
    Kavecky, Slavomir
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 81 - 92
  • [27] Security metrics models and application with SVM in information security management
    Qu, Wei
    Zhang, De-Zheng
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3234 - +
  • [28] A Decision Support Map for Security Patterns Application
    Bouaziz, Rahma
    Kammoun, Slim
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 750 - 759
  • [29] Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests
    Schanes, Christian
    Huebler, Andreas
    Fankhauser, Florian
    Grechenig, Thomas
    IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2013), 2013, : 453 - 460
  • [30] Security Patterns for Webdesign: a Hierarchical Structure Approach
    Mirnig, Alexander G.
    Lupp, Artur
    Meschtscherjakov, Alexander
    Economidou, Eleni
    Tscheligi, Manfred
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,