skip to main content
10.1145/1842752.1842795acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsaConference Proceedingsconference-collections
research-article

Indicator-based architecture-level security evaluation in a service-oriented environment

Published:23 August 2010Publication History

ABSTRACT

The Service-Oriented Architecture paradigm (SOA) is commonly applied for the implementation of complex, distributed business processes. The service-oriented approach promises higher flexibility, interoperability and reusability of the IT infrastructure. However, evaluating the quality attribute security of large and complex SOA configurations is not sufficiently mastered yet. To tackle this complex problem, we developed a method for evaluating the security of existing service-oriented systems on the architectural level. The method is based on recovering security-relevant facts about the system by using reverse engineering techniques and subsequently providing automated support for further interactive security analysis at the structural level. By using generic, system-independent indicators and a knowledge base, the method is not limited to a specific programming language or technology. Therefore, we are able to apply the method to various systems and adapt it to specific evaluation needs. The paper describes the general structure of the method, and presents an instantiation aligned to the Service Component Architecture (SCA) specification.

References

  1. H. Peine, M. Jawurek, S. Mandel, "Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection", High Assurance Systems Engineering Symposium, HASE, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Laws, M. Combellack, R. Feng, H. Mahbod, S. Nash, Tuscany in Action, MEAP Began: February 2009, Softbound print: July 2010.Google ScholarGoogle Scholar
  3. J. Davis, Open Source SOA, Manning Publications; 1 edition, June 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Apache Tuscany, http://tuscany.apache.org/ (accessed April 8th, 2010).Google ScholarGoogle Scholar
  5. Service Component Architecture, http://www.oasis-opencsa.org/sca (accessed May 10th, 2010).Google ScholarGoogle Scholar
  6. OASIS Web Services Security Specification, http://www.oasis-open.org/specs/index.php#wssv1.0 (accessed May 10th, 2010).Google ScholarGoogle Scholar
  7. Eclipse Modeling framework, http://www.eclipse.org/modeling/emf/ (accessed April 8th, 2010).Google ScholarGoogle Scholar
  8. S. Duszynski, J. Knodel, M. Lindvall, SAVE: Software Architecture Visualization and Evaluation, 13th European Conference on Software Maintenance and Reengineering (CSMR), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. F. Swiderski, W. Snyder, Threat Modeling, Microsoft Press, Redmond, Washington, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Sohr and B. Berger. Idea: towards Architecture-Centric Security Analysis of Software, Springer Berlin / Heidelberg, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Liu, I. Traore, A. M. Hoole: A Service-oriented Framework for Quantitative Security Analysis of Software. 2008 IEEE Asia-Pacific Services Computing Conference. Yila, Taiwan. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Alshammari, C. Fidge, D. Corney: Security Metrics for Object-Oriented Class Designs, Ninth international Conference on Quality Software QSIC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Heyman, R. Scandariato, C. Huygens, W. Joosen: Using Security Patterns to Combine Security Metrics. Third international Conference on Availability, Reliability and Security ARES, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. E. Chikofsky, J. Cross: Reverse Engineering and Design Recovery: A Taxonomy. IEEE Software, vol. 7, no. 1, pp. 13--17, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Dobrica, E. Niemelä: A Survey on Software Architecture Analysis Methods. IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 638--653, July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Kazman, M. Klein, P. Clements: ATAM: Method for Architecture Evaluation. Software Engineering Institute technical report CMU/SEI-2000-TR-004, August 2000.Google ScholarGoogle Scholar
  17. P. Bengtsson, J. Bosch: Architecture-Level Prediction of Software Maintenance, 3rd European Conference on Software Maintenance and Reengineering (CSMR), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Indicator-based architecture-level security evaluation in a service-oriented environment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ECSA '10: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
        August 2010
        367 pages
        ISBN:9781450301794
        DOI:10.1145/1842752

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 August 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate48of72submissions,67%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader