Title of article :
A comprehensive pattern-oriented approach to engineering security methodologies
Author/Authors :
Uzunov، نويسنده , , Anton V. and Falkner، نويسنده , , Katrina and Fernandez، نويسنده , , Eduardo B.، نويسنده ,
Issue Information :
ماهنامه با شماره پیاپی سال 2015
Pages :
31
From page :
217
To page :
247
Abstract :
AbstractContext ping secure software systems is an issue of ever-growing importance. Researchers have generally come to acknowledge that to develop such systems successfully, their security features must be incorporated in the context of a systematic approach: a security methodology. There are a number of such methodologies in the literature, but no single security methodology is adequate for every situation, requiring the construction of “fit-to-purpose” methodologies or the tailoring of existing methodologies to the project specifics at hand. While a large body of research exists addressing the same requirement for development methodologies – constituting the field of Method Engineering – there is nothing comparable for security methodologies as such; in fact, the topic has never been studied before in such a context. ive s paper we draw inspiration from a number of Method Engineering ideas and fill the latter gap by proposing a comprehensive approach to engineering security methodologies. proach is embodied in three interconnected parts: a framework of interrelated security process patterns; a security-specific meta-model; and a meta-methodology to guide engineers in using the latter artefacts in a step-wise fashion. A UML-inspired notation is used for representing all pattern-based methodology models during design and construction. The approach is illustrated and evaluated by tailoring an existing, real-life security methodology to a distributed-system-specific project situation. s per proposes a novel pattern-oriented approach to modeling, constructing, tailoring and combining security methodologies, which is the very first and currently sole such approach in the literature. We illustrate and evaluate our approach in an academic setting, and perform a feature analysis to highlight benefits and deficiencies. sion our proposal, developers, architects and researchers can analyze and engineer security methodologies in a structured, systematic fashion, taking into account all security methodology aspects.
Keywords :
Process patterns , MODELING , Software security , Secure software engineering , Method engineering , Security methodologies
Journal title :
Information and Software Technology
Serial Year :
2015
Journal title :
Information and Software Technology
Record number :
2375305
Link To Document :
بازگشت