Model-Driven Security with A System of Aspect-Oriented Security Design Patterns
English
Nguyen, Phu Hong[University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Klein, Jacques[University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Le Traon, Yves[University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
22-Jul-2014
2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling
Yes
No
International
2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling
[en] Model-Driven Security (MDS) has emerged for more than a decade, as a specialization of Model-Driven Engineering (MDE), to propose sound MD methodologies for supporting secure systems development. Yet, there is still a big gap before making MDS approaches more easily applicable and adoptable by industry. Most current MDS approaches only deal with a specific security concern, e.g. Authorization, and have not taken into account multiple security concerns. Besides, security patterns which are based on domain-independent, time-proven security knowledge and expertise, can be considered as reusable security bricks upon which sound and secure systems can be built. But they are not applied as much as they could be, because developers have problems in selecting them and applying them in the right places, especially at the design phase. In this position paper, we propose an exploratory MDS approach based on a System of aspect-oriented Security design Patterns (SoSPa) in which security design patterns are collected, specified as reusable aspect models to form a coherent system of them that guides developers in systematically selecting the right security design patterns for the job. Our MDS approach allows the selected security design patterns to be automatically composed with the target system model. The woven secure system model can then be used for code generation, including configured security infrastructures.
SnT
Fonds National de la Recherche - FnR
I2R-SER-PFN-10MITE > MITER: Modeling, Composing and Testing of Security Concerns > 01/01/2011 - 31/12/2013 > LE TRAON Yves
Researchers ; Professionals ; Students ; General public