Incorporating database systems into a secure software development methodology

被引:2
|
作者
Fernandez, Eduardo B. [1 ]
Jurjens, Jan [2 ]
Yoshioka, Nobukazu [3 ]
Washizaki, Hironori [4 ]
机构
[1] Florida Atlantic Univ, Dept Comp Sci, Boca Raton, FL 33431 USA
[2] Open Univ, Dept Comp, Milton Keynes, Bucks MK7 8 GB, England
[3] Natl Inst Informat, GRACE Ctr, Tokyo, Japan
[4] Waseda Univ, Tokyo 169, Japan
关键词
D O I
10.1109/DEXA.2008.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a combination of them that appears as a good approach to secure software development. The combined methodology applies security at all stages, considers the architectural levels of the system, applies security policies through the use of patterns, and formalizes some portions of the design. We have studied in some detail how to elicit and describe security requirements, how to reflect these requirements in the conceptual model, how to estimate some performance aspects, how to formalize some aspects such as communication protocols, and how to map the conceptual requirements into design artifacts. A design aspect which we have not studied is the incorporation of databases as part of the secure architecture. The database system is a fundamental aspect for security because it stores the persistent information, which constitutes most of the information assets of the institution. We present here some ideas on how to make sure that the database system has the same level of security than the rest of the secure application.
引用
收藏
页码:310 / +
页数:3
相关论文
共 50 条
  • [41] Software Development Activities for Secure Microservices
    Nkomo, Peter
    Coetzee, Marijke
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2019, PT V: 19TH INTERNATIONAL CONFERENCE, SAINT PETERSBURG, RUSSIA, JULY 14, 2019, PROCEEDINGS, PART V, 2019, 11623 : 573 - 585
  • [42] Incorporating Security into Software Development Process
    Yoshioka, R.
    Watanobe, Y.
    Mirenkov, N.
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 99 - 109
  • [43] A Case for the Economics of Secure Software Development
    Heitzenrater, Chad
    Simpson, Andrew
    PROCEEDINGS OF THE 2016 NEW SECURITY PARADIGMS WORKSHOP (NSPW'16), 2016, : 92 - 105
  • [44] Adherence to Secure Software Development Lifecycle
    Omar, Alaa'
    Alsadeh, Ahmad
    Nawahdah, Mamoun
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2022, : 410 - 417
  • [45] A mobile database design methodology for mobile software solutions
    Yu, Weider D.
    Sharma, Sunita
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 121 - +
  • [46] Adaption of Integrated Secure Guide for Secure Software Development Lifecycle
    Lee, Ki-Hyun
    Park, Young B.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 145 - 154
  • [47] A METHODOLOGY FOR SIMULATION OF DATABASE-SYSTEMS
    EICH, MH
    FAN, CF
    SUN, WL
    RAFIQI, S
    SIMULATION, 1989, 52 (06) : 241 - 254
  • [48] Design and implementation of secure medical database systems
    Pangalos, GJ
    MEDICAL INFORMATICS, 1995, 20 (03): : 265 - 277
  • [49] Towards secure object oriented database systems
    Bai, Y
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2002: COOPLS, DOA, AND ODBASE, 2002, 2519 : 1118 - 1131
  • [50] Secure access schemes in mobile database systems
    Hwang, MS
    Lee, CH
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2001, 12 (04): : 303 - 310