Design Patterns for Building Secure Systems
ثبت نشده
چکیده
In these notes we aim to capture some important patterns for building secure systems, and, in particular, what you can do at design time to improve security. How can you choose an architecture that will help reduce the likelihood of flaws in your system, or increase the likelihood that you will be able to survive such flaws? We begin with a powerful concept, the notion of a trusted computing base (TCB).
منابع مشابه
Paul Rimba ICSE Doctoral Symposium_cameraReady
Building high assurance secure applications requires the proper use of security mechanisms and assurances provided by the underlying secure platform. However, applications are often built using security patterns and best practices that are agnostic with respect to the intricate specifics of the different underlying platforms. This independence from the underlying platform leaves a gap between s...
متن کاملA qualitative analysis of software security patterns
Software security, which has attracted the interest of the industrial and research community during the last years, aims at preventing security problems by building software without the so-called security holes. One way to achieve this goal is to apply specific patterns in software architecture. In the same way that the well-known design patterns for building well-structured software have been ...
متن کاملModel-Driven Security with Modularity and Reusability for Secure Systems Development
Model-Driven Security (Mds) has emerged as a promising sound methodology for modern secure systems development. Following the advances in Mds, our work described in this paper has proposed a solution to better support secure systems development, and further strengthens Mds. Our Mds solution focuses on modularity and reusability in secure systems development. On one hand, we have proposed a modu...
متن کاملA Qualitative Evaluation of Security Patterns
Software Security has received a lot of attention during the last years. It aims at preventing security problems by building software without the socalled security holes. One of the ways to do this is to apply specific patterns in software architecture. In the same way that the well-known design patterns for building well-structured software have been used, a new kind of patterns, called securi...
متن کاملAbstract security patterns for requirements specification and analysis of secure systems
security patterns for requirements specification and analysis of secure systems Eduardo B. Fernandez 1 , Nobukazu Yoshioka 2 , Hironori Washizaki 3 , and Joseph Yoder 4 Dept. of Computer Science and Engineering, Florida Atlantic University, USA [email protected] GRACE Center, National Institute of Informatics, Tokyo, Japan [email protected] Waseda University, Tokyo, Japan [email protected] The ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015