Improving software security through an integrated approach

被引:0
|
作者
Gan, Zaobin [1 ]
Wei, Dengwei [1 ]
Varadharajan, Vijay [2 ]
机构
[1] Huazhong Univ Sci & Technol, Wuhan 430074, Peoples R China
[2] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
关键词
system integration; RBAC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has been recognized that the main source of problems with application software security is in most cases that the software is poorly designed and developed with respect to authentication and authorization. Aiming at preventing the security issues in the course of software design and development, this paper presents a framework for integrating a security policy specification with a system function integration. On the basis of the Role-Based Access Control (RBAC) model, this framework moves the responsibility of security through a central authorization management mechanism, Single Sign-On (SSO) access and integration management of security resources. The design can integrate the enterprise's multiple new, developing and existing application systems, and provide end users access these systems as a single system. An application instance of the framework is given in a large-sized enterprise information integrated system as well. The results show that the framework may provide enterprises with uniform and robust enforcement policies to improve the security of sensitive information systems.
引用
收藏
页码:437 / +
页数:2
相关论文
共 50 条
  • [21] An Integrated Model for Software Security Testing Requirements
    Hui, Zhanwei
    Huang, Song
    Liu, Xiaoming
    Rao, Liping
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 1891 - 1895
  • [22] Integrated software vulnerability and security functionality assessment
    Wang, Xiangrong
    Shi, Hang
    Huang, Tze-Yau William
    Lin, Frank C.
    ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2007, : 103 - +
  • [23] An integrated approach to industrial security
    Harmon, Jon
    CHEMICAL ENGINEERING, 2008, 115 (05) : 42 - 46
  • [24] Agent security through software mutation
    Simmons, Sharon
    Edwards, Dennis
    Zimmerman, Travis
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 211 - 215
  • [25] Integrated approach to stockholding software
    Steel Times, 1994, 222 (02):
  • [26] Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking
    El-Bendary, M. A. M.
    Haggag, A.
    Shawki, F.
    Abd-El-Samie, F. E.
    2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 594 - 598
  • [27] Improving economics through integrated IT
    Villarin, J.J.
    Koetter, J.
    World Cement, 30 (06):
  • [28] A New Approach To Measure Software Security
    Han, Wei
    Ye, Hairong
    Ding, Zuohua
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 1352 - 1357
  • [29] Software rejuvenation approach to security engineering
    Aung, KMM
    Park, JS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 574 - 583
  • [30] A software architectural approach to security by design
    Ray, Arnab
    Cleaveland, Rance
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 83 - +