An Approach for Security Patterns Application in Component Based Models

被引:0
|
作者
Bouaziz, Rahma [1 ,2 ]
Kallel, Slim [2 ]
Coulette, Bernard [1 ]
机构
[1] Univ Toulouse, IRIT, Toulouse, France
[2] Univ Sfax, ReDCAD, Sfax, Tunisia
关键词
component based approach; Security pattern; RBAC; UML profile; Model Driven Development; DESIGN; INTEGRATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since applications have become increasingly complex and because the design of secure systems necessitates security expertise, security patterns are now widely used as guidelines proposed by security experts in order to solve a recurring security problem. In order to encourage application designers to take advantage from security solutions proposed by security patterns, we think that it is necessary to provide an appropriate mechanism to implement those patterns. We propose a full security pattern integration methodology from the earliest phases of software development until the generation of the application code. The proposed solution uses the UML component model as an application domain of security patterns and bases on the use of UML profiles and model transformations with the ATL language. For the generation of code and for keeping the separation between the functional code of the component based application and security solution, we use the aspect paradigm. An illustration of the proposed approach is provided using the Role Based Access Control (RBAC) pattern. A case study of GPS system is also provided to demonstrate the application of the proposed approach.
引用
收藏
页码:283 / +
页数:4
相关论文
共 50 条
  • [31] A COSMIC-Based Approach for Verifying the Conformity of BPMN, BPEL and Component Models
    Khlif, Wiem
    Ben-Abdallah, Hanene
    Sellami, Asma
    Haoues, Mariem
    BUSINESS INFORMATION SYSTEMS, PT I, 2019, 353 : 381 - 396
  • [32] Component Splitting-based Approach for Multivariate Beta Mixture Models Learning
    Manouchehri, Narges
    Hieu Nguyen
    Bouguila, Nizar
    2019 7TH IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (IEEE GLOBALSIP), 2019,
  • [33] A Novice Approach for Web Application Security
    Doshi, Jignesh
    Trivedi, Bhushan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 1 - 9
  • [34] Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models
    Li, Tong
    Horkoff, Jennifer
    Mylopoulos, John
    PRACTICE OF ENTERPRISE MODELING, POEM 2014, 2014, 197 : 208 - 223
  • [35] Information security -: an application of a systems approach
    Wennberg, Louise
    Brandt, Patrik
    Revay, Peter
    KYBERNETES, 2006, 35 (5-6) : 786 - 796
  • [36] A Component-Based Debugging Approach for Detecting Structural Inconsistencies in Declarative Equation Based Models
    Jian-Wan Ding
    Li-Ping Chen
    Fan-Li Zhou
    Journal of Computer Science and Technology, 2006, 21 : 450 - 458
  • [37] A component-based debugging approach for detecting structural inconsistencies in declarative equation based models
    Ding, Jian-Wan
    Chen, Li-Ping
    Zhou, Fan-Li
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2006, 21 (03) : 450 - 458
  • [38] An Objective-based Approach for Semantic Validation of Emergence in Component-based Simulation Models
    Szabo, Claudia
    Teo, Yong Meng
    2012 ACM/IEEE/SCS 26TH WORKSHOP ON PRINCIPLES OF ADVANCED AND DISTRIBUTED SIMULATION (PADS), 2012, : 155 - 162
  • [39] A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection
    Szabo, Zoltan
    Bilicki, Vilmos
    FUTURE INTERNET, 2023, 15 (10)
  • [40] Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
    Nobelis, N.
    Boudaoud, K.
    Delettre, C.
    Riveill, M.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2012, 3 (01) : 1 - 16