Formal Specification of Software Architecture Security Tactics
نویسندگان
چکیده
This paper provides a Z specification for the Software Architectural Tactics of Authentication and Authorization for the Security Quality Attribute. A model of a system is created and each tactic is defined with respect to the model. Each tactic is independent however, the system encompasses all the required functionality for all the tactics.
منابع مشابه
Quality-driven architecture development using architectural tactics
This paper presents a quality-driven approach to embodying non-functional requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architectural building blocks, providing general architectural solutions for common issues pertaining to quality attributes. In this approach, architectural tactics are represented as feature models, and their se...
متن کاملA Formal Approach for Incorporating Architectural Tactics into the Software Architecture
Software architects principally leverage successful architectural design practices systematized in terms of architectural styles and tactics. While architectural tactics focus on particular non-functional properties, styles are typical solutions that generally coverage several aspects. The problem is that we do not yet have a formal account of how styles and tactics interact in a way that is su...
متن کاملToward Automated Component Adaptation
This paper explores the use of specification matching to discover and select component adaptation strategies. This is done within a formal framework that integrates specification-based component retrieval with a formal architecture representation to support component retrieval and adaptation. The key to integration is determining the relationship between what components are potentially reusable...
متن کاملAttacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool
The paper presents an approach and formal framework for modeling attacks against computer network and its software implementation on the basis of a multi-agent architecture. The model of an attack is considered as a complex process of contest of adversary entities those are malefactor or team of malefactors, on the one hand, and network security system implementing a security policy, on the oth...
متن کاملFormal Specification and Verification of Control Software for
Microprocessor-based systems are increasingly being used to provide improved security. The t c improvements in security are often accomplished at the cost of increased complexity, as when a smar ard microprocessor replaces a simple password system for network access control. Formal methods l m are recognized as an effective means of assuring the security of systems, and have been used in severa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010