Using FDAF to bridge the gap between enterprise and software architectures for security

被引:9
|
作者
Dai, Lirong
Cooper, Kendra
机构
[1] Univ Texas Dallas, Dallas, TX 75083 USA
[2] Seattle Univ, Seattle, WA 98122 USA
关键词
aspect-oriented design; enterprise architecture; software architecture; traceability;
D O I
10.1016/j.scico.2006.10.010
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The vision, strategies, and goals of enterprises involve numerous security issues; these stem from legal and business concerns. In turn, these goals are realized by the enterprise, organized into business groups, departments, divisions, etc. For example, a financial organization, such as a bank, needs to provide a range of services to their customers including private banking, commercial banking, international banking, and investment services. These services are provided by sub-organizations in the enterprise (i.e., the enterprise architecture); the sub-organizations are often partitioned along the business lines. For example, one sub-organization is responsible for private banking, another for commercial banking, etc. When providing financial services, there is a need to ensure that customer and account data are kept private, not corrupted, and safely backed up. Some of these needs may be realized in a collection of software applications. The problem of effectively designing secure software systems to meet an organization's needs is a critical part of their success. This paper focuses on the problem of how to bridge the gap between enterprise and software architectures for security using a set of UML based notations: the Business Modeling Extension for UML, standard UML use case diagrams, and the Formal Design Analysis Framework (FDAF). The Business Modeling Extension and standard UML are established approaches we adopt in this work. FDAF is an aspect-oriented approach that supports the design and analysis of nonfunctional properties for distributed, real-time systems at the software architecture level. An empirical study for an online banking system is used to illustrate the approach. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:87 / 102
页数:16
相关论文
共 50 条
  • [1] Bridging the gap between enterprise architectures and software architectures
    Chung, Lawrence
    Subramanian, Nary
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2007, 66 (01) : 1 - 3
  • [2] Modeling enterprise software architectures using UML
    Kobryn, C
    [J]. ENTERPRISE DISTRIBUTED OBJECT COMPUTING - PROCEEDINGS SECOND INTERNATIONAL WORKSHOP, 1998, : 25 - 34
  • [3] Security Characterization for Evaluation of Software Architectures using ATAM
    Raza, Asad
    Abbas, Haider
    Yngstrom, Louise
    Hemani, Ahmed
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2009, : 196 - 201
  • [4] Closing the Gap Between Enterprise Models and Service-Oriented Architectures
    Juhrisch, Martin
    Esswein, Werner
    [J]. ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 295 - +
  • [5] Formalizing the Relationship between Security Policies and Objectives in Software Architectures
    Rouland, Quentin
    Hamid, Brahim
    Bodeveix, Jean-Paul
    Jaskolka, Jason
    [J]. 2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION, ICSA-C, 2023, : 151 - 158
  • [6] Bridging the gap between software development and information security
    van Wyk, KR
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (05) : 75 - 79
  • [7] Enterprise engineering, and security - Enterprise frameworks and architectures, and IA patterns
    Heaney, J
    Hybertson, DI
    Reedy, A
    Chapin, S
    Kirwan, M
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 293 - 294
  • [8] One-for-All: Bridge the Gap Between Heterogeneous Architectures in Knowledge Distillation
    Hao, Zhiwei
    Guo, Jianyuan
    Han, Kai
    Tang, Yehui
    Hu, Han
    Wang, Yunhe
    Xu, Chang
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [9] Adopting an enterprise software security framework
    Steven, J
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 84 - 87
  • [10] MDSolids: Software to Bridge the Gap Between Lectures and Homework in Mechanics of Materials
    Philpot, Timothy A.
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION, 2000, 16 (05) : 401 - 407