2016
DOI: 10.1007/978-3-319-44341-6_2
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Enforcement of Security Properties

Abstract: Ensuring the security requirements of an application is not a straightforward task. Security properties (e.g., confidentiality, anonymity) need to be satisfied in different ways in different parts of the same application. Software architects are usually required to manually define security components and their dependencies with the base application, customize them to the application's requirements, identify the points where security is incorporated, and verify that the selected places are correct. The last two… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Finding the right combination of algorithms and correct settings to use is often difficult [3]. Cryptography is also required by almost all electronic-based systems, such as e-payment systems and e-voting applications [65,74]. The encryption components need to be specifically customized to the application's requirements (e.g., the RSA algorithm with keys of 2048 bits) and then introduced (weaving) in the software architec-ture of the applications in a non-intrusive way (e.g., using an aspect-oriented approach).…”
Section: Rq1: Which Advanced Variability Modeling Characteristics And...mentioning
confidence: 99%
“…Finding the right combination of algorithms and correct settings to use is often difficult [3]. Cryptography is also required by almost all electronic-based systems, such as e-payment systems and e-voting applications [65,74]. The encryption components need to be specifically customized to the application's requirements (e.g., the RSA algorithm with keys of 2048 bits) and then introduced (weaving) in the software architec-ture of the applications in a non-intrusive way (e.g., using an aspect-oriented approach).…”
Section: Rq1: Which Advanced Variability Modeling Characteristics And...mentioning
confidence: 99%