An aspect-oriented methodology for designing secure applications

نویسندگان

  • Geri Georg
  • Indrakshi Ray
  • Kyriakos Anastasakis
  • Behzad Bordbar
  • Manachai Toahchoodee
  • Siv Hilde Houmb
چکیده

We propose a methodology, based on Aspect-Oriented Modeling (AOM), for incorporating security mechanisms in an application. The functionality of the application is described using the primary model and the attacks are specified using aspects. The attack aspect is composed with the primary model to obtain the misuse model. The misuse model describes how much the application can be compromised. If the results are unacceptable, then some security mechanism must be incorporated into the application. The security mechanism, modeled as security aspect, is composed with the primary model to obtain the security treated model. The security treated model is analyzed to give assurance that it is resilient to the attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architecting Secure Software Systems Using an Aspect-Oriented Approach: : A Survey of Current Research

The importance of security in the development of complex software systems has increasingly become more critical as software becomes increasingly more pervasive in our everyday lives. Aspect-orientation has been proposed as a means to handle the crosscutting nature of security requirements when developing, designing and implementing security-critical applications. This paper surveys some of the ...

متن کامل

Aspect-Oriented Risk Driven Development of Secure Applications

Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to be bypassed resulting in a security breach. Methodologies are needed for incorporating security mechanisms in an application and assessing whether the resulting system is indeed secure. We propose one such methodology for desi...

متن کامل

Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture

This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...

متن کامل

An Investigation to Physical Aspects of Middle Area in Squares as a Useful Indicator for Designing Community-Oriented Urban Plazas (Case Study: Italian Piazzas of Campidoglio in Rome, Del Campo in Siena and San Marco in Venice)

Middle of squares, one of the components of physical aspect is considered as an appropriateindicator in designing successful urban squares, which consequently promotes visual quality. The present study aims todetermine how the above mentioned aspect was presented in the Middle-Ages and Renaissance within Italian squares.Considering the aim of the investigation, library studies as well as visual...

متن کامل

Helping to Meet the Security Needs of Enterprises: Using FDAF to Build RBAC into Software Architectures

The vision, strategies, and goals of enterprises involve numerous security issues; these stem from legal and business concerns. For example, a financial organization, such as a bank, needs to ensure that employee and customer data are kept private and account balances for customers are not corrupted. Some of these needs may be realized in a collection of software applications such as employee p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information & Software Technology

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2009