Security Beneets from Software Architecture
نویسندگان
چکیده
In today's eld of distributed software architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and having various Quality of Service requirements (e.g., timeliness, availability or security). System customization using middleware-services is a promising solution to deal with the coexistence of multiple applications with diierent Quality of Service requirements. From the security point of view, the goal for system customization is to permit the interoperation among applications having diierent, possibly inconsistent security constraints. This paper demonstrates how the software architecture paradigm is beneecial for addressing security issues in distributed systems through system customization. The software architecture paradigm allows the application developer to abstractly specify security-related requirements. Then, our framework takes in charge the system customization to meet these requirements. The practical use of our approach is also addressed by discussing its integration in a connguration-based distributed programming environment .
منابع مشابه
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملApplication level active networking
In this paper we describe and discuss an Application Level Active Network system. This system provides the beneets of proposed Active Networks, including rapid and transparent deployment of new network services. However our system is also relatively free of the problems of router-level Active Network deployment, such as concerns over safety and resource management. We describe our overall archi...
متن کاملArchitectures and Formal Representations for Secure Systems Architectures and Formal Representations for Secure Systems Executive Summary
As used in this report, the term formal methods encompasses mathematical and logical techniques for representing and analyzing computer systems, with the intent of increasing (1) the rigor with which a system can be deened, (2) the security and reliability that can be attained by system design and implementation, and (3) the dependability with which the requirements can be met. This report cons...
متن کاملLeveraging Reuse Through Domain-Speci c Software Architectures
Object-orientated frameworks, software architectures, generators, and domain analysis are all technologies that claim to make reuse possible. In this position paper, we argue that in order to achieve a higher level of reuse, all these technologies should be combined into a single development framework using the concept of domain-speciic software architectures. We will examine the elements of a ...
متن کامل