Model-driven security patterns application based on dependences among patterns

Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

The spread of open-software services through the Internet increases the importance of security. A security pattern is one of the techniques in which developers utilize security experts' knowledge. Security patterns contain typical solutions about security problems. However there is a possibility that developers may apply security patterns in inappropriate ways due to a lack of consideration on dependencies among patterns. Application techniques of security patterns that consider such dependencies have not been proposed yet. In this paper, we propose an automated application technique of security patterns in model driven software development by defining applications procedures of security patterns to models as model transformation rules with consideration for pattern dependencies. Our technique prevents inappropriate applications such as the application of security patterns to wrong model elements and that in wrong orders. Therefore our technique supports developers apply security patterns to their own models automatically in appropriate ways.

Original languageEnglish
Title of host publicationARES 2010 - 5th International Conference on Availability, Reliability, and Security
Pages555-559
Number of pages5
DOIs
Publication statusPublished - 2010 May 21
Event5th International Conference on Availability, Reliability, and Security, ARES 2010 - Krakow, Poland
Duration: 2010 Feb 152010 Feb 18

Publication series

NameARES 2010 - 5th International Conference on Availability, Reliability, and Security

Conference

Conference5th International Conference on Availability, Reliability, and Security, ARES 2010
CountryPoland
CityKrakow
Period10/2/1510/2/18

Keywords

  • ATL
  • Component
  • Model driven development
  • Security patterns
  • UML

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Model-driven security patterns application based on dependences among patterns'. Together they form a unique fingerprint.

  • Cite this

    Shiroma, Y., Washizaki, H., Fukazawa, Y., Kubo, A., & Yoshioka, N. (2010). Model-driven security patterns application based on dependences among patterns. In ARES 2010 - 5th International Conference on Availability, Reliability, and Security (pp. 555-559). [5438040] (ARES 2010 - 5th International Conference on Availability, Reliability, and Security). https://doi.org/10.1109/ARES.2010.103