Security Characterisation and Integrity Assurance for Software Components and Component-Based Systems
نویسندگان
چکیده
Software systems are increasingly assembled from components that are developed by and purchased from third parties for technical and economic gains In such component based software development the functionality and quality of service attributes of the soft ware components should be clearly and adequately speci ed or packaged through their interfaces so that the characteristics of the systems assembled from the components can be analysed relative to the system requirements In this paper we consider one particular quality of service attribute i e security and outline an approach to specifying the security characteristics of software components and analysing the security properties of component based systems in terms of their component characteristics and system architec tures The approach is partially based on the Common Criteria for Information Technology Security Evaluation In addition we also introduce our work on ensuring the integrity of software components as part of the infrastructural support for component based software engineering
منابع مشابه
A cautionary note regarding the data integrity capacity of certain secure systems
The need to provide standard commercial-grade productivity applications as the general purpose user interface to high-assurance data processing environments is compelling, and has resulted in proposals for several di erent types of \trusted" systems. We characterize some of these systems as a class of architecture. We discuss the general integrity property that systems can only be trusted to ma...
متن کاملQuantify Assurance from a Negative Perspective
Commodity software components are intrinsically untrustworthy and it is highly insecure to use them directly in mission critical systems. The trustworthiness of a system can be only vaguely specified or achieved without a quantifiable level of assurance measurement of the components used in the system. While large amounts of research efforts have been devoted to establishing a certain quantifia...
متن کاملCrypto-integrity
Designing cryptographic mechanisms as well as products and systems that embed cryptographic components is a challenging task. This task will become increasingly hard as software technology and systems evolve and as the new computational environment becomes more distributed, more diverse, and more global. In order to enable the inclusion of cryptographic components in the future infrastructure a...
متن کاملA Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framework provides an explicit opportunity for software composers as well as software components to test a priori security properties of software components in a system composition. The proposed framework uses logic programmi...
متن کاملA Component-based Architecture for Software Vulnerability Management
Recently, the increasing usages of software system in different web applications are threaten and attacked for security vulnerabilities. It impacts the existing information infrastructure seriously. Thus, how to identify, classify, remediate and mitigate the vulnerabilities of software had refereed as an important step to improve the software system's assurance. Basically the vulnerabilities ar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998