Engineering Security into Distributed Systems: A Survey of Methodologies

被引:0
作者
Uzunov, Anton V. [1 ]
Fernandez, Eduardo B. [2 ]
Falkner, Katrina [1 ]
机构
[1] Univ Adelaide, Adelaide, SA 5005, Australia
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Computer Security; Security Engineering; Secure Software Engineering; Distributed Systems; Security Methodologies; Model Driven Security; Secure Software; MODEL-DRIVEN DEVELOPMENT; INFORMATION-SYSTEMS; INTEGRATING SECURITY; ORIENTED APPROACH; DESIGN; REQUIREMENTS; ARCHITECTURE; TROPOS; FRAMEWORK; PATTERNS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Rapid technological advances in recent years have precipitated a general shift towards software distribution as a central computing paradigm. This has been accompanied by a corresponding increase in the dangers of security breaches, often causing security attributes to become an inhibiting factor for use and adoption. Despite the acknowledged importance of security, especially in the context of open and collaborative environments, there is a growing gap in the survey literature relating to systematic approaches (methodologies) for engineering secure distributed systems. In this paper, we attempt to fill the aforementioned gap by surveying and critically analyzing the state-of-the-art in security methodologies based on some form of abstract modeling (i.e. model-based methodologies) for, or applicable to, distributed systems. Our detailed reviews can be seen as a step towards increasing awareness and appreciation of a range of methodologies, allowing researchers and industry stakeholders to gain a comprehensive view of the field and make informed decisions. Following the comprehensive survey we propose a number of criteria reflecting the characteristics security methodologies should possess to be adopted in real-life industry scenarios, and evaluate each methodology accordingly. Our results highlight a number of areas for improvement, help to qualify adoption risks, and indicate future research directions.
引用
收藏
页码:2920 / 3006
页数:87
相关论文
共 253 条
[71]  
FERNANDEZ EB, 2000, P 19 INT C CONC MOD, V1920, P183
[72]  
Fernandez EB., 1997, In Proc. ACM Workshop on RBAC, P121
[73]  
FERNANDEZ EB, 2003, P CHILIPLOP 2003
[74]  
Fernandez E, 2007, INT FED INFO PROC, V242, P345
[75]  
Fernandez EB, 2009, ADV INFORM SECUR, V45, P37, DOI 10.1007/978-0-387-88775-3_3
[76]   Modeling Misuse Patterns [J].
Fernandez, Eduardo B. ;
Yoshioka, Nobukazu ;
Washizaki, Hironori .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :566-+
[77]  
FERNANDEZ Eduardo B., 2004, Procs. of the 2004 Int. Conf. on Software Engineering Research and Practice (SERP'04), P21
[78]  
Fernandez Eduardo B., 2001, P 8 C PATT LANG PROG
[79]  
Fernandez Eduardo B, 2011, Software Engineering for Secure Systems: Industrial and Research Perspectives, P16
[80]   Model-Driven Development for secure information systems [J].
Fernandez-Medina, Eduardo ;
Jurjens, Jan ;
Trujillo, Juan ;
Jajodia, Sushil .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) :809-814