IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Designing Secure Software by Testing Application of Security Patterns

Designing Secure Software by Testing Application of Security Patterns
View Sample PDF
Author(s): Takanori Kobashi (Waseda University, Japan), Hironori Washizaki (Waseda University, Japan & National Institute of Informatics, Japan & SYSTEM INFORMATION Co Ltd, Japan & eXmotion, Japan), Nobukazu Yoshioka (National Institute of Informatics, Japan), Haruhiko Kaiya (Kanagawa University, Japan), Takao Okubo (Institute of Information Security, Japan)and Yoshiaki Fukazawa (Waseda University, Japan)
Copyright: 2019
Pages: 34
Source title: Exploring Security in Software Architecture and Design
Source Author(s)/Editor(s): Michael Felderer (University of Innsbruck, Austria)and Riccardo Scandariato (Chalmers University of Technology, Sweden & University of Gothenburg, Sweden)
DOI: 10.4018/978-1-5225-6313-6.ch006

Purchase

View Designing Secure Software by Testing Application of Security Patterns on the publisher's website for pricing and purchasing information.

Abstract

Simply confirming potential threats and vulnerabilities in an early stage of the development process (e.g., the requirement or design phase) is insufficient because software developers are not necessarily security experts. Additionally, even if the software design considers security at an early stage, whether the software actually satisfies the security requirements must be confirmed. To realize secure design, the authors propose an application to design software systems with verification of security patterns using model testing. The method provides extended security patterns, which include requirement- and design-level patterns as well as a new designing and model testing process that uses these patterns. Once developers specify threats and vulnerabilities in the target system in an early stage of development, the method can verify whether the security patterns are properly applied and assess if the vulnerabilities are resolved.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom