Using FDAF to bridge the gap between enterprise and software architectures for security

被引:9
|
作者
Dai, Lirong
Cooper, Kendra
机构
[1] Univ Texas Dallas, Dallas, TX 75083 USA
[2] Seattle Univ, Seattle, WA 98122 USA
关键词
aspect-oriented design; enterprise architecture; software architecture; traceability;
D O I
10.1016/j.scico.2006.10.010
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The vision, strategies, and goals of enterprises involve numerous security issues; these stem from legal and business concerns. In turn, these goals are realized by the enterprise, organized into business groups, departments, divisions, etc. For example, a financial organization, such as a bank, needs to provide a range of services to their customers including private banking, commercial banking, international banking, and investment services. These services are provided by sub-organizations in the enterprise (i.e., the enterprise architecture); the sub-organizations are often partitioned along the business lines. For example, one sub-organization is responsible for private banking, another for commercial banking, etc. When providing financial services, there is a need to ensure that customer and account data are kept private, not corrupted, and safely backed up. Some of these needs may be realized in a collection of software applications. The problem of effectively designing secure software systems to meet an organization's needs is a critical part of their success. This paper focuses on the problem of how to bridge the gap between enterprise and software architectures for security using a set of UML based notations: the Business Modeling Extension for UML, standard UML use case diagrams, and the Formal Design Analysis Framework (FDAF). The Business Modeling Extension and standard UML are established approaches we adopt in this work. FDAF is an aspect-oriented approach that supports the design and analysis of nonfunctional properties for distributed, real-time systems at the software architecture level. An empirical study for an online banking system is used to illustrate the approach. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:87 / 102
页数:16
相关论文
共 50 条
  • [31] Using Process Mining to Bridge the Gap between BI and BPM
    van der Aalst, Wil
    [J]. COMPUTER, 2011, 44 (12) : 77 - 80
  • [32] Using Deep Learning to Bridge the Gap Between Perception and Intelligence
    Suppe, Arne J.
    Hebert, Martial
    [J]. UNMANNED SYSTEMS TECHNOLOGY XIX, 2017, 10195
  • [33] Towards Real-Time Monitoring and Controlling of Enterprise Architectures Using Business Software Control Centers
    Brueckmann, Tobias
    Gruhn, Volker
    Pfeiffer, Max
    [J]. SOFTWARE ARCHITECTURE, 2011, 6903 : 287 - 294
  • [34] Enterprise information security, a review of architectures and frameworks from interoperability perspective
    Shariati, Marzieh
    Bahmani, Faezeh
    Shams, Fereidoon
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [35] SOFTWARE, HARDWARE BRIDGE PC-TO-VAX GAP
    RATTAZZI, G
    [J]. MINI-MICRO SYSTEMS, 1987, 20 (02): : D1 - &
  • [36] How to close the gap between hardware and software using FMEA
    Bidokhti, Nematollah
    [J]. ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2007 PROCEEDINGS, 2006, : 167 - 172
  • [37] Modelling the Evolution of Enterprise Architectures using Ontologies
    Silva, Nuno
    da Silva, Miguel Mira
    Sousa, Pedro
    [J]. 2017 IEEE 19TH CONFERENCE ON BUSINESS INFORMATICS (CBI), VOL 1, 2017, 1 : 79 - 88
  • [38] A Computer Engineering Curriculum Model for Teaching Software Development to Bridge the Gap between Academia and Industry
    Marco-Galindo, Maria-Jesus
    Marco-Simo, Josep M.
    Fuertes-Alpiste, Marc
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION, 2018, 34 (04) : 1400 - 1410
  • [39] A security framework for developing service-oriented software architectures
    Rafe, Vahid
    Hosseinpouri, Ramin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 2957 - 2972
  • [40] Systematic security analysis for service-oriented software architectures
    Liu, Yanguo
    Traore, Issa
    [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 612 - 621