Developing Secure Chemical Programs with Aspects

نویسندگان

  • Alvaro Arenas
  • Jean-Pierre Banâtre
  • Thierry Priol
چکیده

This paper studies security engineering of distributed systems when following the chemical-programming paradigm, represented here by the High-Order Chemical Language (HOCL). We have analysed how to model secure systems using HOCL. Emphasis is on modularity, hence we advocate for the use of aspect-oriented techniques, where security is seen as a cross-cutting concern impacting the whole system. We show how HOCL can be used to model Virtual Organisations (VOs), exemplified by a VO system for the generation of digital products. We also develop security patterns for HOCL, including patterns for security properties such as authorisation, integrity and secure logs. The patterns are applied to HOCL programs following an aspectoriented approach, where aspects are modelled as transformation functions that add to a program a cross-cutting concern.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations

Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations N. De Francesco L. Martini Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Formal Aspects of Security and Trust, Newcastle upon Tyne, 18-19 July 2005 N. De Francesco, L. Martini AI to Check SIF in programs with I/O Security Annotations Preliminaries The Two Semantics Examples Sum...

متن کامل

Developing Secure Objects

Distributed object systems are increasingly popular, and considerable effort is being expended to develop standards for interaction between objects. Some high-level requirements for secure distributed object interaction have been identified. However, there are no guidelines for developing the secure objects themselves. Some aspects of object-oriented design do not translate directly to traditio...

متن کامل

MALTREATMENT (CHILD) Fostering Secure Attachment in Child Victims of Maltreatement: Comments on van IJzendoorn and Bakermans-Kranenburg

Such an examination is a priority because the resulting studies will enable services to be developed that are specific to the needs of the maltreated children and their caregivers. Indeed, it is disconcerting to note that even now, unfortunately, inappropriate clinical practices are employed by some clinicians and parents even when abusive and dangerous for the child’s life. 2,3 In our opinion,...

متن کامل

EFL Teacher Educators and EFL teachers’ Perspectives on Identity-Oriented Teacher Education Programs

Different aspects of identity have been investigated across various educational fields. Although many studies have been done to investigate different aspects of EFL teachers’ identity development, there is a paucity of research on identity-oriented EFL teacher education programs. Hence, the purpose of the current study was to investigate EFL teacher educators’ and EFL teachers’ perspectives abo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008