Validating security design patterns application using model testing

Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa

研究成果: Conference contribution

8 引用 (Scopus)

抜粋

Software developers are not necessarily security specialists, security patterns provide developers with the knowledge of security specialists. Although security patterns are reusable and include security knowledge, it is possible to inappropriately apply a security pattern or that a properly applied pattern does not mitigate threats and vulnerabilities. Herein we propose a method to validate security pattern applications. Our method provides extended security patterns, which include requirement- and design-level patterns as well as a new model testing process using these patterns. Developers specify the threats and vulnerabilities in the target system during an early stage of development, and then our method validates whether the security patterns are properly applied and assesses whether these vulnerabilities are resolved.

元の言語English
ホスト出版物のタイトルProceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013
ページ62-71
ページ数10
DOI
出版物ステータスPublished - 2013 12 1
イベント2013 8th International Conference on Availability, Reliability and Security, ARES 2013 - Regensburg, Germany
継続期間: 2013 9 22013 9 6

出版物シリーズ

名前Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013

Conference

Conference2013 8th International Conference on Availability, Reliability and Security, ARES 2013
Germany
Regensburg
期間13/9/213/9/6

    フィンガープリント

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality

これを引用

Kobashi, T., Yoshioka, N., Okubo, T., Kaiya, H., Washizaki, H., & Fukazawa, Y. (2013). Validating security design patterns application using model testing. : Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013 (pp. 62-71). [6657227] (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013). https://doi.org/10.1109/ARES.2013.13