Software Architectural Design meets Security Engineering

被引:6
作者
Bode, Stephan [1 ]
Fischer, Anja [1 ]
Kuehnhauser, Winfried [1 ]
Riebisch, Matthias [1 ]
机构
[1] Tech Univ Ilmenau, Ilmenau, Germany
来源
16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS | 2009年
关键词
D O I
10.1109/ECBS.2009.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well as software engineering provide methods to deal with such requirements. However, there is still a critical gap concerning the integration of the methods of these separate fields. In this paper we close this gap with respect to security requirements by proposing a method that combines software engineering approaches with state-of-the-art security engineering principles. This method establishes an explicit alignment between the non-functional goal, the principles in the field of security engineering, and the implementation of a security architecture. The method aims at designing a system's security architecture based on a small, precisely defined, and application-specific trusted computing base. We illustrate this method by means of a case study which describes distributed enterprise resource planning systems using web services to implement business processes across company boundaries.
引用
收藏
页码:109 / 118
页数:10
相关论文
共 26 条
  • [1] ABOWD G, 1997, CMUSEI96TR025
  • [2] Anderson J., 1972, Technical Report ESD-TR-73-51
  • [3] Bell D. E., 1973, 770768 AD MITRE, VI
  • [4] A trust-based context-aware access control model for Web-services
    Bhatti, R
    Bertino, E
    Ghafoor, A
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2005, 18 (01) : 83 - 105
  • [5] Bosch J, 2000, DESIGN USE SOFTWARE
  • [6] Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
  • [7] Bryce C., 1997, Journal of Computer Security, V5, P225
  • [8] BRYCE C, 1997, 1060 GMD FORSCH INF
  • [9] Chung L., 2000, Non-functional Requirements in Software Engineering
  • [10] CUPPENS F, 1996, P COMP SEC FDN WORKS