Incorporating database systems into a secure software development methodology

被引:2
|
作者
Fernandez, Eduardo B. [1 ]
Jurjens, Jan [2 ]
Yoshioka, Nobukazu [3 ]
Washizaki, Hironori [4 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci, Boca Raton, FL 33431 USA
[2] Open Univ, Dept Comp, Milton Keynes, Bucks MK7 8 GB, England
[3] Natl Inst Informat, GRACE Ctr, Tokyo, Japan
[4] Waseda Univ, Tokyo 169, Japan
关键词
D O I
10.1109/DEXA.2008.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a combination of them that appears as a good approach to secure software development. The combined methodology applies security at all stages, considers the architectural levels of the system, applies security policies through the use of patterns, and formalizes some portions of the design. We have studied in some detail how to elicit and describe security requirements, how to reflect these requirements in the conceptual model, how to estimate some performance aspects, how to formalize some aspects such as communication protocols, and how to map the conceptual requirements into design artifacts. A design aspect which we have not studied is the incorporation of databases as part of the secure architecture. The database system is a fundamental aspect for security because it stores the persistent information, which constitutes most of the information assets of the institution. We present here some ideas on how to make sure that the database system has the same level of security than the rest of the secure application.
引用
收藏
页码:310 / +
页数:3
相关论文
共 50 条
  • [31] Overview of Software Engineering and Systems Engineering Development Methodology for Embedded System
    Suliman, Azizah
    Nazri, Nursyazana
    PROCEEDING OF KNOWLEDGE MANAGEMENT INTERNATIONAL CONFERENCE (KMICE) 2014, VOLS 1 AND 2, 2014, : 643 - 648
  • [32] An Approach to Secure Legacy Software Systems
    Jasser, Stefanie
    Kelbert, Jonas
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 299 - 309
  • [33] A DEVELOPMENT METHODOLOGY FOR SCIENTIFIC SOFTWARE
    CORT, G
    GOLDSTONE, JA
    NELSON, RO
    POORE, RV
    MILLER, L
    BARRUS, DM
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 1985, 32 (04) : 1439 - 1443
  • [34] Essential software development methodology
    Trussell, L
    IEEE POWER ENGINEERING SOCIETY - 1999 WINTER MEETING, VOLS 1 AND 2, 1999, : 357 - 361
  • [35] Software development methodology debate
    Pitagorsky, G
    COMPUTER, 2004, 37 (12) : 6 - 6
  • [36] Vendors Push Secure Software Development
    Garber, Lee
    COMPUTER, 2013, 46 (07) : 13 - 13
  • [37] Cybersecurity Through Secure Software Development
    Josang, Audun
    Odegaard, Marte
    Oftedal, Erlend
    INFORMATION SECURITY EDUCATION ACROSS THE CURRICULUM, WISE 9, 2015, 453 : 53 - 63
  • [38] AUDITING SOFTWARE DEVELOPMENT PROJECTS - A CONTROL MECHANISM FOR THE DIGITAL SYSTEMS DEVELOPMENT METHODOLOGY.
    Walker, Michael G.
    1979, : 310 - 314
  • [39] Motorola secure software development model
    Mahendran, Francis
    Nadworny, Margaret
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS, 2007, : 293 - +
  • [40] TOOLS AND TECHNIQUES FOR THE DEVELOPMENT OF SECURE SOFTWARE
    DAVEY, J
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 35 : 173 - 178