skip to main content
10.1145/3167486.3167519acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccwcsConference Proceedingsconference-collections
research-article

A New Extension of Larman's Operation Contracts for Security Properties Injection and Verification during the System's Internal Behavior Elaboration

Published:14 November 2017Publication History

ABSTRACT

Lately, there have been many types of study works addressing the model-driven security so that to incorporate the security verification during system's development process or modeling phase basing on Model-Driven Architecture that deploys Unified Modelling Language standard as the meta-model for different system's abstractions. To the best of our knowledge, most of these works have been addressing security rules verification after deployment phase and without taking into account security infrastructure generation, deducing the source code corresponding to the functional and non-functional aspect at the same time. In this current work, we have concentrated our efforts on non-functional components, business logic, and quality of services of the systems so that to reduce design mistakes and generating secure software applications that respect the criteria's of the software engineering qualities. To do that, we have proposed a new meta-model for Java platform allowing to improve the MDA methodology to inject the security architecture description and security properties verification during software development process. Therefore, security properties will be described in the form of secure models represented through Security profile and enriched through the Object Constraint Language designed to add the security constraints to security models. Basing on the new approach, an Intermediate Structural Model (ISM) is obtained from chosen Platform Specific Model (PSM) to enrich the functional code with other improvements instead generating the source code directly.

In this context, ISM will be improved with security rules and constraints about confidentiality, availability, non-repudiation, data integrity, and data encryption after its generation from sequence diagram of system internal behavior that respects the proposed meta-model. Finally, the final code will be generated from sequence diagram of system's internal behavior such as application security configuration, methods signatures and their bodies, persistent entities, and the security objects.

References

  1. A. Lasbahani, M. Chhiba, and A. Tabyaoui, O. Mjihil, Model Driven Architecture Approach for Application Security Integration, Journal of Theoretical and Applied Information, Vol. 95(8), pp. 1655--1668, April, 2017.Google ScholarGoogle Scholar
  2. D. Basin, J. Doser, and T. Lodderstedt, Model Driven Security: From UML Models to Access Control Infrastructures, ACM Transactions on Software Engineering and Methodology, Vol. 15(1), pp. 39--91, January, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Lodderstedt, D.A. Basin, J. Doser, Secureuml: A uml-based modeling language for model-driven security, Proceedings of the 5th International Conference on The Unified Modeling Language, Vol. 02, pp. 426--441, London, UK, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Wolter, M. Meznel, C. Meinel, Modeling security goals in business processes, Vol. 127 of LNI, pp. 201--216. Köllen, 2008.Google ScholarGoogle Scholar
  5. F. Satoh, Y. Nakamura, K. Ono, Adding Authentication to Model Driven Security, IEEE International Conference on Web Services, pp. 585--594, September, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Satoh, Y. Yamaguchi, Generic security policy transformation framework for ws-security, IEEE Computer Society on ICWS, pp. 513--520, 2007.Google ScholarGoogle Scholar
  7. F. Satoh, N. Mukhi, Y. Nakamura, et S. Hirose, Pattern-based policy configuration for SOA applications, IEEE, pp. 13--20, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Satoh, Y. Nakamura, N. Mukhi, M. Tatsubori, K. Ono, Methodology and tools for end-to-end SOA security configurations, in IEEE Congress on Services - Part I. IEEE Computer Society, pp. 307--314, July, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Juerjens, UMLsec: Extending UML for secure systems development, Proceedings of the 5th International Conference on The Unified Modeling Language, UML '02, Springer-Verlag. pp. 412--425, London, UK, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Hafner, M. Breu, R. Breu, and A. Nowak, "Modelling inter-organizational workflow security in a peer-to-peer environment," in ICWS '05: Proceedings of the IEEE International Conference on Web Services (ICWS'05). Washington, DC, USA: IEEE Computer Society, 2005, pp. 533--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Reznik, T. Ritter, R. Schreiner, U. Lang, Model driven development of security aspects, Electronic Notes in Theoretical Computer Science, Vol. 163(2), pp. 65--79, April, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Girault, R. Valk, Petri-Nets for Systems Engineering. Springer, 2003, Berlin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Larman, Applying UML and Patterns, 3rd Edition, Prentice Hall, ISBN 0-13-148906-2, 2002.Google ScholarGoogle Scholar

Index Terms

  1. A New Extension of Larman's Operation Contracts for Security Properties Injection and Verification during the System's Internal Behavior Elaboration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCWCS'17: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems
      November 2017
      512 pages
      ISBN:9781450353069
      DOI:10.1145/3167486

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 November 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader