Security patterns: A method for constructing secure and efficient inter-company coordination systems

Nobukazu Yoshioka, Shinichi Honiden, Anthony Finkelstein

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter-company system coordination applications. A key difficulty in constructing such systems is to meet the security requirements while at the same time respecting the requirements for efficient implementation. In this paper, we propose a method that addresses this problem and show an application of the method to a real implemented system, the Environmentally Conscious Product (ECP) design support system. Our approach enables developers to specify several candidate system behaviors that satisfy the security requirements. We use patterns for this purpose. Patterns are abstract templates of system behavior fragments. The patterns include agent migrations, communications between applications and security procedures. We model the performance data associated with each pattern. Developers can then select an efficient implementation using this model to compare the performance data of the candidates. We evaluate our approach with a significant real-world example, the ECP design support system that essentially requires inter-company system coordination.

Original languageEnglish
Title of host publicationProceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004
Pages84-97
Number of pages14
DOIs
Publication statusPublished - 2004 Dec 1
Externally publishedYes
EventProceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004 - Monterey, CA, United States
Duration: 2004 Sep 202004 Sep 24

Other

OtherProceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004
CountryUnited States
CityMonterey, CA
Period04/9/2004/9/24

Fingerprint

Computer systems
Product design
Industry
Intranets
Mobile agents
Internet
Communication
Ecodesign

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Yoshioka, N., Honiden, S., & Finkelstein, A. (2004). Security patterns: A method for constructing secure and efficient inter-company coordination systems. In Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004 (pp. 84-97) https://doi.org/10.1109/EDOC.2004.1342507

Security patterns : A method for constructing secure and efficient inter-company coordination systems. / Yoshioka, Nobukazu; Honiden, Shinichi; Finkelstein, Anthony.

Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. 2004. p. 84-97.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yoshioka, N, Honiden, S & Finkelstein, A 2004, Security patterns: A method for constructing secure and efficient inter-company coordination systems. in Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. pp. 84-97, Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004, Monterey, CA, United States, 04/9/20. https://doi.org/10.1109/EDOC.2004.1342507
Yoshioka N, Honiden S, Finkelstein A. Security patterns: A method for constructing secure and efficient inter-company coordination systems. In Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. 2004. p. 84-97 https://doi.org/10.1109/EDOC.2004.1342507
Yoshioka, Nobukazu ; Honiden, Shinichi ; Finkelstein, Anthony. / Security patterns : A method for constructing secure and efficient inter-company coordination systems. Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004. 2004. pp. 84-97
@inproceedings{12dfb0ec000140c190dea013327fb25d,
title = "Security patterns: A method for constructing secure and efficient inter-company coordination systems",
abstract = "As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter-company system coordination applications. A key difficulty in constructing such systems is to meet the security requirements while at the same time respecting the requirements for efficient implementation. In this paper, we propose a method that addresses this problem and show an application of the method to a real implemented system, the Environmentally Conscious Product (ECP) design support system. Our approach enables developers to specify several candidate system behaviors that satisfy the security requirements. We use patterns for this purpose. Patterns are abstract templates of system behavior fragments. The patterns include agent migrations, communications between applications and security procedures. We model the performance data associated with each pattern. Developers can then select an efficient implementation using this model to compare the performance data of the candidates. We evaluate our approach with a significant real-world example, the ECP design support system that essentially requires inter-company system coordination.",
author = "Nobukazu Yoshioka and Shinichi Honiden and Anthony Finkelstein",
year = "2004",
month = "12",
day = "1",
doi = "10.1109/EDOC.2004.1342507",
language = "English",
isbn = "0769522149",
pages = "84--97",
booktitle = "Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004",

}

TY - GEN

T1 - Security patterns

T2 - A method for constructing secure and efficient inter-company coordination systems

AU - Yoshioka, Nobukazu

AU - Honiden, Shinichi

AU - Finkelstein, Anthony

PY - 2004/12/1

Y1 - 2004/12/1

N2 - As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter-company system coordination applications. A key difficulty in constructing such systems is to meet the security requirements while at the same time respecting the requirements for efficient implementation. In this paper, we propose a method that addresses this problem and show an application of the method to a real implemented system, the Environmentally Conscious Product (ECP) design support system. Our approach enables developers to specify several candidate system behaviors that satisfy the security requirements. We use patterns for this purpose. Patterns are abstract templates of system behavior fragments. The patterns include agent migrations, communications between applications and security procedures. We model the performance data associated with each pattern. Developers can then select an efficient implementation using this model to compare the performance data of the candidates. We evaluate our approach with a significant real-world example, the ECP design support system that essentially requires inter-company system coordination.

AB - As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter-company system coordination applications. A key difficulty in constructing such systems is to meet the security requirements while at the same time respecting the requirements for efficient implementation. In this paper, we propose a method that addresses this problem and show an application of the method to a real implemented system, the Environmentally Conscious Product (ECP) design support system. Our approach enables developers to specify several candidate system behaviors that satisfy the security requirements. We use patterns for this purpose. Patterns are abstract templates of system behavior fragments. The patterns include agent migrations, communications between applications and security procedures. We model the performance data associated with each pattern. Developers can then select an efficient implementation using this model to compare the performance data of the candidates. We evaluate our approach with a significant real-world example, the ECP design support system that essentially requires inter-company system coordination.

UR - http://www.scopus.com/inward/record.url?scp=17744383167&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=17744383167&partnerID=8YFLogxK

U2 - 10.1109/EDOC.2004.1342507

DO - 10.1109/EDOC.2004.1342507

M3 - Conference contribution

AN - SCOPUS:17744383167

SN - 0769522149

SP - 84

EP - 97

BT - Proceedings - Eighth IEEE International Enterprise Distributed Object Computing Workshop, EDOC 2004

ER -