Security Hardening UML Profile (SHP): A New Approach to Specify Security Hardening Solutions in UML

نویسندگان

  • D. Mouheb
  • C. Talhi
  • A. Mourad
  • V. Lima
  • M. Debbabi
  • L. Wang
  • M. Pourzandi
چکیده

Security plays a predominant role in software engineering. Enforcing security policies should be considered during the early stages of the software development lifecycle to prevent security breaches in the final products. Because of the pervasive nature of security, integrating security solutions at the software design level may result in the scattering and tangling of security concerns throughout the entire design. To tackle this problem, we propose in this paper a new approach of representing and enforcing the hardening solutions based on aspect-orientation. This new approach provides software designers with UML-based capabilities to perform security hardening in a systematic and organized way, at the UML design level, without the need to have extensive security expertise. We also present SHP profile, a UML-based security hardening language to describe and specify security hardening solutions at the UML design level. Finally, we illustrate the applicability and the relevance of our approach through a real case study.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation

Security plays a predominant role in software engineering. Enforcing security policies should be considered during the early stages of the software development lifecycle to prevent security breaches in the final products. Because of the pervasive nature of security, integrating security solutions at the software design level may result in the scattering and tangling of security concerns through...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

The Open University ’ s repository of research publications and other research outputs Tools for model - based security engineering : models vs . code

We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycritical part of the system (e.g. a crypto protocol) using the UML security extension UMLsec. The models are automatically verified for security properties using automated theorem provers. These are implemented within a fr...

متن کامل

The Open University ’ s repository of research publications and other research outputs Tools for model - based security engineering : models vs . code Conference Item

We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycritical part of the system (e.g. a crypto protocol) using the UML security extension UMLsec. The models are automatically verified for security properties using automated theorem provers. These are implemented within a fr...

متن کامل

An Aspect-oriented Framework for Systematic Security Hardening of Software

An Aspect-Oriented Framework for Systematic Security Hardening of Software Azzam Mourad, Ph.D. Concordia University, 2008 In this thesis, we address the problems related to the security hardening of open source software. Accordingly, we first propose an aspect-oriented and pattern-based approach for systematic security hardening. It is based on the full separation between the roles and duties o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009