Model-driven security patterns application based on dependences among patterns

Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)

    Abstract

    The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.

    Original languageEnglish
    Title of host publicationARES 2010 - 5th International Conference on Availability, Reliability, and Security
    Pages555-559
    Number of pages5
    DOIs
    Publication statusPublished - 2010
    Event5th International Conference on Availability, Reliability, and Security, ARES 2010 - Krakow
    Duration: 2010 Feb 152010 Feb 18

    Other

    Other5th International Conference on Availability, Reliability, and Security, ARES 2010
    CityKrakow
    Period10/2/1510/2/18

    Fingerprint

    Software engineering
    Internet

    Keywords

    • ATL
    • Component
    • Model driven development
    • Security patterns
    • UML

    ASJC Scopus subject areas

    • Computational Theory and Mathematics
    • Safety, Risk, Reliability and Quality

    Cite this

    Shiroma, Y., Washizaki, H., Fukazawa, Y., Kubo, A., & Yoshioka, N. (2010). Model-driven security patterns application based on dependences among patterns. In ARES 2010 - 5th International Conference on Availability, Reliability, and Security (pp. 555-559). [5438040] https://doi.org/10.1109/ARES.2010.103

    Model-driven security patterns application based on dependences among patterns. / Shiroma, Yuki; Washizaki, Hironori; Fukazawa, Yoshiaki; Kubo, Atsuto; Yoshioka, Nobukazu.

    ARES 2010 - 5th International Conference on Availability, Reliability, and Security. 2010. p. 555-559 5438040.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Shiroma, Y, Washizaki, H, Fukazawa, Y, Kubo, A & Yoshioka, N 2010, Model-driven security patterns application based on dependences among patterns. in ARES 2010 - 5th International Conference on Availability, Reliability, and Security., 5438040, pp. 555-559, 5th International Conference on Availability, Reliability, and Security, ARES 2010, Krakow, 10/2/15. https://doi.org/10.1109/ARES.2010.103
    Shiroma Y, Washizaki H, Fukazawa Y, Kubo A, Yoshioka N. Model-driven security patterns application based on dependences among patterns. In ARES 2010 - 5th International Conference on Availability, Reliability, and Security. 2010. p. 555-559. 5438040 https://doi.org/10.1109/ARES.2010.103
    Shiroma, Yuki ; Washizaki, Hironori ; Fukazawa, Yoshiaki ; Kubo, Atsuto ; Yoshioka, Nobukazu. / Model-driven security patterns application based on dependences among patterns. ARES 2010 - 5th International Conference on Availability, Reliability, and Security. 2010. pp. 555-559
    @inproceedings{a691a66ca8c04e68a4f91aa41513b1fe,
    title = "Model-driven security patterns application based on dependences among patterns",
    abstract = "The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.",
    keywords = "ATL, Component, Model driven development, Security patterns, UML",
    author = "Yuki Shiroma and Hironori Washizaki and Yoshiaki Fukazawa and Atsuto Kubo and Nobukazu Yoshioka",
    year = "2010",
    doi = "10.1109/ARES.2010.103",
    language = "English",
    isbn = "9780769539652",
    pages = "555--559",
    booktitle = "ARES 2010 - 5th International Conference on Availability, Reliability, and Security",

    }

    TY - GEN

    T1 - Model-driven security patterns application based on dependences among patterns

    AU - Shiroma, Yuki

    AU - Washizaki, Hironori

    AU - Fukazawa, Yoshiaki

    AU - Kubo, Atsuto

    AU - Yoshioka, Nobukazu

    PY - 2010

    Y1 - 2010

    N2 - The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.

    AB - The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.

    KW - ATL

    KW - Component

    KW - Model driven development

    KW - Security patterns

    KW - UML

    UR - http://www.scopus.com/inward/record.url?scp=77952345686&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=77952345686&partnerID=8YFLogxK

    U2 - 10.1109/ARES.2010.103

    DO - 10.1109/ARES.2010.103

    M3 - Conference contribution

    SN - 9780769539652

    SP - 555

    EP - 559

    BT - ARES 2010 - 5th International Conference on Availability, Reliability, and Security

    ER -