A Customizable and Secure Software Architecture
نویسندگان
چکیده
منابع مشابه
Software Architecture Constraints as Customizable, Reusable and Composable Entities
One of the major advantages of component-based software engineering is the ability for developers to reuse and assemble software entities to build complex software. Whereas decomposition of software into components has been and is largely addressed for what concerns the business (functional) part of applications, this is not yet the case for what concerns their documentation (non-functional) pa...
متن کاملA Secure Software Architecture Description Language
Security is becoming a more and more important concern for software architecture and software components. Previous modeling approaches provide insufficient support for an indepth treatment of security. This paper argues for a more comprehensive treatment of an important security aspect, access control, at the architecture level. Our approach models security subject, resource, privilege, safegua...
متن کاملArchitecture and Design Considerations for Secure Software
ion is a process for reducing the complexity of a system by removing unnecessary details and isolating the most important elements to make the design more manageable. Decomposition (also known as factoring) is the process of describing the generalizations that compose an abstraction. One method, top-down decomposition, involves breaking down a large system into smaller parts. For object-oriente...
متن کاملAspect-Oriented Secure Connectors for Implementation of Secure Software Architecture
This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...
متن کاملChallenges in Secure Software Evolution - The Role of Software Architecture
Achieving quality properties for software systems and maintaining them during evolution is challenging. Especially, security properties often degrade during software evolution. This is often not noticed and can lead to monetary loss and serious damage to the company’s image. Approaches for maintaining security properties exist but fail to exploit the knowledge of the architectural design phase....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Information Security Research
سال: 2014
ISSN: 2042-4639
DOI: 10.20533/ijisr.2042.4639.2014.0058