Towards Computer-oriented Security Patterns
نویسنده
چکیده
Security patterns are a mature paradigm for the development of secure systems. For years, security patterns have proven their usefulness, and have demonstrated that their use, especially at the software architecture level, provides important advantages. Security patterns have also proven their value as a communication vehicle and as an educational tool. However, the ever-growing complexity and heterogeneity of software systems, which now range from tiny pieces of extremely delicate software for the control of embedded devices to internet-scale applications that are used by millions of users, are slowly but inevitably degrading the usefulness and applicability of security patterns in their current text-based form. Moreover, as new applications and technologies appear, the amount of new security solutions grows and with them the number and variety of security patterns representing them. The need to support the selection of the most appropriate pattern based on different parameters and criteria is not well-served by document-based patterns, which are more appropriate for educational purposes than for supporting current model-based and computer-assisted engineering activities. In fact, the engineering and development of software systems cannot be conceived today without a high level of automated support. Finally, security patterns in their current form provide limited support for their integration in the systems under development, resulting in different problems that may even reduce or ruin the intended security property that was meant to be provided by the pattern. The previous reasoning takes us to the core of the content of this paper: the need for a computer-oriented form of patterns, along with mechanisms for automating their use.
منابع مشابه
Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications
The utilization of the object-oriented approach to design and develop systems/applications has continued to increase throughout the 1990s. Security concerned users and organizations must now protect and control access to object-oriented systems and applications. This paper frames a paradigm for security in object-oriented systems and applications by addressing the following: Shouldn't security ...
متن کاملAn Approach to the Specification of Software Security Patterns
Software Security patterns enforce security characteristics already at the design phase of a software system. They have been defined in analogy to the well-established Design Patterns that help to develop well-structured software. Since there is no systematic way to identify them we attempt to establish a common specification methodology, in order to enable an automatic recognition of existing ...
متن کاملA Knowledge-Oriented Approach to Security Requirements Engineering for E-Voting System
In this paper, we introduce a knowledge-oriented approach for the Security Requirements Engineering phase for developing E-Voting System. The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency towards security experts can be reduced. In this paper w...
متن کاملTowards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models
Security is an important feature of system design which should be taken into account early in the development of systems. We propose an extension of the SPACE engineering method in order to integrate security aspects into the system design and implementation. The integration of security mechanisms is facilitated by collaboration-oriented models of the functional system specification (i.e., by d...
متن کاملJava and Internet Security
The Java programming language has significantly eased the development of Internet applications and networking software in general. At the same time it has also raised concerns about the already weak security procedures on the Internet. In this report we describe the main prevention mechanisms against the data communication threats and examine the Java security architecture and how it is prepare...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013