Model-Driven Development of Secure Service Applications

被引:8
作者
Borek, Marian [1 ]
Moebius, Nina [1 ]
Stenzel, Kurt [1 ]
Reif, Wolfgang [1 ]
机构
[1] Univ Augsburg, Inst Software & Syst Engn, D-86135 Augsburg, Germany
来源
PROCEEDINGS OF THE 2012 IEEE 35TH SOFTWARE ENGINEERING WORKSHOP (SEW 2012) | 2012年
关键词
UML; model-driven development; Security; Web Service; code generation; security-critical systems;
D O I
10.1109/SEW.2012.13
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The development of a secure service application is a difficult task and designed protocols are very error-prone. To develop a secure SOA application, application-independent protocols (e.g. TLS or Web service security protocols) are used. These protocols guarantee standard security properties like integrity or confidentiality but the critical properties are application-specific (e.g. "a ticket can not be used twice"). For that, security has to be integrated in the whole development process and application-specific security properties have to be guaranteed. This paper illustrates the modeling of a security-critical service application with UML. The modeling is part of an integrated software engineering approach that encompasses model-driven development. Using the approach, an application based on service-oriented architectures (SOA) is modeled with UML. From this model executable code as well as a formal specification to prove the security of the application is generated automatically. Our approach, called SecureMDD, supports the development of security-critical applications and integrates formal methods to guarantee the security of the system. The modeling guidelines are demonstrated with an online banking example.
引用
收藏
页码:62 / 71
页数:10
相关论文
共 23 条
[1]  
Alam MM, 2004, INMIC 2004: 8TH INTERNATIONAL MULTITOPIC CONFERENCE, PROCEEDINGS, P498
[2]  
[Anonymous], 2008, The transport layer security (TLS) protocol version 1.2
[3]  
Baïna K, 2004, BIOMED SCI INSTRUM, V3084, P290
[4]  
BALSER M, 2000, LNCS, V1783
[5]   Model Driven Security: From UML models to access control infrastructures [J].
Basin, D ;
Doser, J ;
Lodderstedt, T .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) :39-91
[6]  
Borger Egon, 2003, Abstract State Machines: A Method for High-Level System Design and Analysis
[7]  
Deubler M., 2004, Proceedings of the 2nd international conference on Service oriented computing, P115, DOI [10.1145/1035167.1035185, DOI 10.1145/1035167.1035185]
[8]  
DOLEV D, 1981, P 22 IEEE S FDN COMP
[9]  
Gronmo R, 2004, 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, P42
[10]  
Group O. M., 2011, METAOBJECT FACILITY