Please use this identifier to cite or link to this item: http://hdl.handle.net/2440/90777
Citations
Scopus Web of ScienceĀ® Altmetric
?
?
Type: Conference paper
Title: A comprehensive pattern-driven security methodology for distributed systems
Author: Uzunov, A.V.
Falkner, K.
Fernandez, E.B.
Citation: Proceedings, 2014 23rd Australasian Software Engineering Conference, ASWEC 2014, 2014 / pp.142-151
Publisher: IEEE Computer Society
Issue Date: 2014
Series/Report no.: Australian Software Engineering Conference
ISBN: 9781479931491
ISSN: 1530-0803
Conference Name: 2014 23rd Australasian Software Engineering Conference (ASWEC 2014) (07 Apr 2014 - 10 Apr 2014 : Sydney, N.S.W.)
Abstract: Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of security features should proceed by means of a systematic approach, combining principles from both software and security engineering. Such systematic approaches, particularly those implying some sort of process aligned with the development life-cycle, are termed security methodologies. One of the most important classes of such methodologies is based on the use of security patterns. While the literature presents a number of pattern-driven security methodologies, none of them are designed specifically for general distributed systems. Going further, there are also currently no methodologies with mixed specific applicability, e.g. for both general and peer-to-peer distributed systems. In this paper we aim to fill these gaps by presenting a comprehensive pattern-driven security methodology specifically designed for general distributed systems, which is also capable of taking into account the specifics of peer-to-peer systems. Our methodology takes the principle of encapsulation several steps further, by employing patterns not only for the incorporation of security features (via security solution frames), but also for the modeling of threats, and even as part of its process. We illustrate and evaluate the presented methodology via a realistic example -- the development of a distributed system for file sharing and collaborative editing. In both the presentation of the methodology and example our focus is on the early life-cycle phases (analysis and design).
RMID: 0030007499
DOI: 10.1109/ASWEC.2014.14
Appears in Collections:Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.