Security Benefits from Software Architecture
نویسندگان
چکیده
In today's eld of distributed software architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and having various Quality of Service requirements (e.g., timeliness, availability or security). System customization using middleware-services is a promising solution to deal with the coexistence of multiple applications with diierent Quality of Service requirements. From the security point of view, the goal for system customization is to permit the in-teroperation among applications having diierent, possibly inconsistent security constraints. This paper demonstrates how the software architecture paradigm is beneecial for addressing security issues in distributed systems through system customization. The software architecture paradigm allows the application developer to abstractly specify security-related requirements. Then, our framework takes in charge the system customization to meet these requirements. The practical use of our approach is also addressed by discussing its integration in a connguration-based distributed programming environment. Les b en eecies des architectures logicielles pour la s ecurit e informatique R esum e : Le domaine des architectures logicielles a aujourd'hui besoin d'un environne-ment facilitant le d eveloppement des applications compos ees de modules logiciels h et ero-g enes, et ayant dii erentes exigences en termes de qualit e de services (e.g., temps de r eponse, disponibilit e ou s ecurit e). La sp ecialisation des syst emes d'ex ecution via l'utilisation de services middleware est une solution prometteuse pour supporter la coexistence de multiples applications avec dii erentes exigences en termes de qualit e de services. Du point de vue de la s ecurit e informatique, l'objectif de la sp ecialisation de syst emes est de permettre l'interop eration entre applications ayant dii erentes contraintes de s ecu-rit e eventuellement incompatibles. Ce papier montre comment les architectures logicielles peuvent ^ etre utilis ees pour l'int egration de la s ecurit e dans les syst emes distribu es via la sp ecialisation des syst emes d'ex ecution. Les architectures logicielles permettent aux d eve-loppeurs d'applications de sp eciier de mani ere abstraite leurs exigences en termes de s ecurit e informatique. Notre environnement peut alors sp ecialiser le syst eme d'ex ecution pour garan-tir ces exigences. L'utilisation pratique de notre approche est egalement trait ee en proposant son int egration dans un environnement de programmation distribu ee par connguration.
منابع مشابه
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کاملIntegrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system design with security enforcement, which would otherwise benefits both development process and system’s quality of service (QoS). This paper proposes a formal method to integrate security administration into software arc...
متن کاملModelSec: A Generative Architecture for Model-Driven Security
Increasingly, the success of software systems depends largely on how their security requirements are satisfied. However, developers are challenged in implementing these requirements, mainly because of the gap between the specification and implementation, and the technical complexities of the current software infrastructures. Recently, Model-Driven Security has emerged as a new software developm...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملForensic investigation of cloud computing systems
Cloud computing platforms can (in theory) scale infinitely, with the addition of more hardware units bringing more resources to the system. However, despite the many benefits of cloud architecture, the effect of the virtualised model has broad similarities to centralised mainframe architecture – software and its data is held and managed remotely from its users, only accessible via that particul...
متن کاملAn Approach to Automated Realization and Validation of Software Architecture Model – A Case Study on E-Commerce
The benefits of architecture description languages (ADLs) cannot not be fully captured without an automated realization of software architecture designs because manually shifting from a model to its implementation is errorprone. In addition, validation of the realization process is necessary to ensure system properties kept after the realization. We proposed an integrated approach for automatic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997