2016
DOI: 10.3390/info7020034
|View full text |Cite
|
Sign up to set email alerts
|

Implementation Support of Security Design Patterns Using Test Templates

Abstract: Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an "aspect test template" to observe the internal process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 28 publications
(33 reference statements)
0
4
0
Order By: Relevance
“…In literature, selection and application of security patterns for security requirements of IoT does not have empirical methodology. The limitation in [21] may overcome i.e Object Constraint Language (OCL) may not necessary to prepare Decision Table and pointcut advice Model (Aspect Programming) to understand the pattern internal processing. Instead of OCL, we can use Misuse case extension to prepare decision table and Pointcut Advice pair model.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In literature, selection and application of security patterns for security requirements of IoT does not have empirical methodology. The limitation in [21] may overcome i.e Object Constraint Language (OCL) may not necessary to prepare Decision Table and pointcut advice Model (Aspect Programming) to understand the pattern internal processing. Instead of OCL, we can use Misuse case extension to prepare decision table and Pointcut Advice pair model.…”
Section: Discussionmentioning
confidence: 99%
“…We adapted Text Categorization Process [19], Restricted Misuse Case Modeling [20], validating security patterns using Test Template [21] approaches to extend our Methodology. The proposed Sa-SDLC methodology, integrate security patterns mechanisms in each phase of SDLC to reduce impact of vulnerabilities.…”
Section: The Proposed Methodologymentioning
confidence: 99%
“…Research is needed to answer a number of fundamental questions related to how requirements for forensic-ready systems should be implemented and whether these requirements are solely about data preservation activities. Architectural patterns (similar to security patterns [29]) could also be investigated to design forensic-ready systems. Additional challenges relate to managing trade-offs between forensic readiness requirements such as privacy and availability given that some of these could manifest at runtime.…”
Section: Representing and Reasoning About Forensic-ready Systemsmentioning
confidence: 99%
“…Yoshizawa et al are concerned with implementation aspects of security patterns [8]. They indicate that developers may apply the patterns in ways that introduce vulnerabilities and propose a test template to determine if an applied pattern has introduced vulnerabilities.…”
mentioning
confidence: 99%