Incorporating database systems into a secure software development methodology

被引:2
|
作者
Fernandez, Eduardo B. [1 ]
Jurjens, Jan [2 ]
Yoshioka, Nobukazu [3 ]
Washizaki, Hironori [4 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci, Boca Raton, FL 33431 USA
[2] Open Univ, Dept Comp, Milton Keynes, Bucks MK7 8 GB, England
[3] Natl Inst Informat, GRACE Ctr, Tokyo, Japan
[4] Waseda Univ, Tokyo 169, Japan
关键词
D O I
10.1109/DEXA.2008.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a combination of them that appears as a good approach to secure software development. The combined methodology applies security at all stages, considers the architectural levels of the system, applies security policies through the use of patterns, and formalizes some portions of the design. We have studied in some detail how to elicit and describe security requirements, how to reflect these requirements in the conceptual model, how to estimate some performance aspects, how to formalize some aspects such as communication protocols, and how to map the conceptual requirements into design artifacts. A design aspect which we have not studied is the incorporation of databases as part of the secure architecture. The database system is a fundamental aspect for security because it stores the persistent information, which constitutes most of the information assets of the institution. We present here some ideas on how to make sure that the database system has the same level of security than the rest of the secure application.
引用
收藏
页码:310 / +
页数:3
相关论文
共 50 条
  • [21] Design of Secure Medical Database Systems
    S Afr Comput J, 17 (45):
  • [22] Transaction acceleration in secure database systems
    Haraty, RA
    Fany, RC
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2000, : 13 - 16
  • [23] A TUTORIAL ON SECURE DATABASE-SYSTEMS
    PANGALOS, G
    INFORMATION AND SOFTWARE TECHNOLOGY, 1994, 36 (12) : 717 - 724
  • [24] Secure Software Engineering for Agile Methodology Preliminary Investigation
    Ramadani, Luthfi
    Utama, Nur Ichsan
    2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGY AND INFORMATION MANAGEMENT (ICCTIM), 2015, : 134 - 139
  • [25] Database development methodology and organization
    Purba, S
    INFORMATION SYSTEMS MANAGEMENT, 1999, 16 (01) : 72 - 77
  • [26] Secure Feature Driven Development (SFDD) Model for Secure Software Development
    Firdaus, Adila
    Ghani, Imran
    Jeong, Seung Ryul
    2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 546 - 553
  • [27] Extending OCL for secure database development
    Fernández-Medina, E
    Piattini, M
    UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 380 - 394
  • [28] A methodology for designing networked secure systems
    Al-Sharjabi, H
    Mackenzie, L
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 947 - 951
  • [29] Human factors in software development A study on database systems adoption by developers
    Terzi, Ioanna
    Divitini, Monica
    Avouris, Nikolaos
    2ND INTERNATIONAL CONFERENCE OF THE GREECE ACM SIGCHI CHAPTER, CHIGREECE 2023, 2023,
  • [30] A Software Development Tool for Improving Quality of Service in Distributed Database Systems
    Hababeh, Ismail Omar
    2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 126 - 130