Model-Driven Security with Modularity and Reusability for Secure Systems Development
نویسندگان
چکیده
Model-Driven Security (Mds) has emerged as a promising sound methodology for modern secure systems development. Following the advances in Mds, our work described in this paper has proposed a solution to better support secure systems development, and further strengthens Mds. Our Mds solution focuses on modularity and reusability in secure systems development. On one hand, we have proposed a modular approach for modularity and dynamic adaptation of flexibly secure systems. On the other hand, we have been working on Mds based on a library-like System of generic Security design Patterns (shortly called SoSPa) in which security design patterns are collected, specified as reusable aspect models to form a coherent system of them that guides developers in systematically selecting the right security design patterns for the job. Either way, security (design pattern) models can be automatically woven into the target system model. The woven secure system model can then be used for (partial) code generation, including (configured) security infrastructures. We have also worked on model-based security testing to validate the resulting secure systems.
منابع مشابه
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management
Model-Driven Security (Mds) is a specialized Model-Driven Engineering (Mde) approach for supporting the development of secure systems. Model-Driven Security aims at improving the productivity of the development process and quality of the resulting secure systems, with models as the main artifact. Among the variety of models that have been studied in a Model-Driven Security perspective, one can ...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملModel-driven development of embedded systems on OSGi platforms
Large and complex systems design is still being a challenge even bigger when developing embedded, distributed or real-time systems. OSGi is a platform created to reduce some of the software design problems, increasing reusability modularity, etc. This paper describes a methodology based in MDA that aims at real-time embedded systems, The approach is based on a target platform using OSGi and thu...
متن کامل