27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

concerns. A secure connector can be reused in different<br />

applications if it m atches the security requirem ent and<br />

communication style between application components. To<br />

validate this approach, the s ecure connectors have been<br />

implemented in an electronic commerce application.<br />

This paragraph describes future resea rch for sec ure<br />

connectors. The security services provided by secure<br />

connectors described in t his paper are confidentiality,<br />

integrity, non-repudiation, authentication, and<br />

authorization. Secure c onnectors can be extended to<br />

include an availability security service, which should be<br />

capable of preventing deliberate denial of services in a<br />

software application. In addition, security connectors can<br />

be specialized to ones that realize specific m ethods or<br />

algorithms. For e xample, a secure connector containing<br />

access control security servi ce can be implemented with<br />

role-based access control or mandatory access control. To<br />

realize these specific methods or algorit hms, a secure<br />

connector could be specialized to create the a ppropriate<br />

secure objects. In addition, secure connectors can be<br />

building blocks for composing secure software<br />

architectures along with application components. Future<br />

work needs more investigation on how software<br />

architectures for secure applications can be composed of<br />

secure connectors and application components.<br />

References<br />

[1] S. Banerjee, C. A. Mattmann, N. Medvidovic, and L.<br />

Golubchik, “Leveraging Architectural Models to Inject<br />

Trust into Soft ware <strong>Systems</strong>,”<br />

<strong>Proceedings</strong> of the ICSE 2005 Works hop on Software<br />

Engineering for Sec ure <strong>Systems</strong>, St. L ouis, Missouri,<br />

May, 2005.<br />

[2] M. Moriconi, X. Qian, R. A. Riemenschneider, and Li<br />

Gong “Secure Software Architectures,” IEEE Symposium<br />

on Security and Privacy, 1997.<br />

[3] Y. Deng, J. Wang, J. J. P. Tsai, and K. Beznosov, “An<br />

Approach for Modeling and Analysis of Security System<br />

Architectures,” IEEE Transactions on <strong>Knowledge</strong> and<br />

Data Engineering, vol.15, no.5, pp.1099-1119, Sept/Oct,<br />

2003.<br />

[4] H. Gomaa, D. A. Menasce, and M. E. Shin, “Reusable<br />

Component Patterns for Distributed Software<br />

Architectures,” <strong>Proceedings</strong> of ACM Symposium on<br />

Software Reusability, ACM Press, Pages 69-77, Toronto,<br />

Canada, May 2001.<br />

for Secure <strong>Systems</strong>, St. Louis, Missouri, USA, May 15-16,<br />

2005.<br />

[6] G. Gong, I. Ray, and R . France, “Using Aspects to<br />

Design a Sec ure System,” <strong>Proceedings</strong> of the 8 th IEEE<br />

International Conference on Engineering of Com plex<br />

Computer <strong>Systems</strong>, December, 2002.<br />

[7] H. Gomaa, M. E. Shin , “Modeling Complex <strong>Systems</strong><br />

by Separating Application and Security Concerns” 9 th<br />

IEEE International Conference on Engineering of<br />

Complex Computer <strong>Systems</strong> (ICECCS 2004), Italy, April,<br />

2004.<br />

[8] M. E. Shin and H. Gomaa, “Software Modeling of<br />

Evolution to a Secure Application: From Requirements<br />

Model to Soft ware Architecture,” Science of Computer<br />

Programming, Volume 66, Issue 1, April 2007, pp. 60-70.<br />

[9] H. Gomaa, “Software Modeling and Design: UML,<br />

Use Cases, Patterns, and Software Architectures”,<br />

Cambridge University Press, February 2011.<br />

[10] G. Booch, J. Rumbaugh, and I. Jacobson, “The<br />

Unified Modeling Language User Guide,” Addison<br />

Wesley, 2nd Edition, 2005.<br />

[11] J. Ru mbaugh, G. Booch, and I. Jaco bson, “The<br />

Unified Modeling Language Reference Manual,”<br />

Addison-Wesley, 2 nd Edition, 2004.<br />

[12] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E.<br />

Youman, “Role-based access control models,” IEEE<br />

Computer, Volume 29, Issue 2, February 1996, pp. 38-47.<br />

[13] C. P. Pfleeger, a nd S. L. Pfleege r, “Security in<br />

Computing,” Prentice-Hall, Inc., third edition, 2002.<br />

[14] F. B uschmann, R. M eunier, H. Rohnert, and P.<br />

Sommerlad, "Pattern Oriented Software Architecture: A<br />

System of Patterns," John Wiley & Sons, 1996.<br />

[15] R. N. Ta ylor, N. Medvidovic, and E. M. Dashofy,<br />

“Software Arcthiecture: Foundations, The ory, and<br />

Practice,” John Wiley & Sons, 2010.<br />

[16] D. Bas h, M. Clavel, a nd M. Egea, “A Decade of<br />

Model-Driven Security,” 16th ACM symposium on<br />

Access control models and technol ogies SACMAT11,<br />

Innsbruck, Austria, June 15-17, 2011.<br />

[5] J. Re n, R. Taylor , P. Dourish, and D. Redmiles,<br />

“Towards An Architectural Treatment of Softwa re<br />

Security: A Connector-Centric Approach,”<br />

<strong>Proceedings</strong> of the Workshop on Software Engineering<br />

399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!