Academia.eduAcademia.edu

Outline

Developing secure software and systems

2004

Abstract

Abstract: The development and maintenance of network and data security in software systems is done in a late phase of design and coding or during deployment, often in an ad-hoc manner. Network monitoring and recovery, encryption protocols, best practices for combating cyber-crime, or disaster recovery planning are useful methodologies applied to enforce security of a deployed system. Nevertheless these are not enough to protect from attacks directed to software vulnerabilities hidden at design and code level.

References (19)

  1. References
  2. Special Issue on security software, Software Practice and Experience, vol. 33, issue 5, 2003.
  3. Common Criteria. http://www.commoncriteria.org/
  4. T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security", 5th International Conference on the Unified Modeling Language, 2002.
  5. The AspectJ Programming Guide, the AspectJ team, available at http://aspectj.org
  6. The Aspectc project, available at http://www.aspectc.org/
  7. J. Suzuki and Y. Yamamoto. "Extending UML with Aspects: Aspect Support in the Design Phase," In Proc. of the 3rd Aspect-Oriented Programming (AOP) Workshop at The 13th European Conference on Object Oriented Programming (ECOOP'99), Springer LNCS 1743, Lisbon, Portugal, June 1999.
  8. O. Aldawud, T. Elrad, and A. Bader, "A UML Profile for Aspect Oriented Modeling". OOPSLA 2001 workshop on Aspect Oriented Programming.
  9. R. Pawlak, L. Duchien, G. Florin, F. Legond-Aubry, L. Seinturier, and L. Martelli, "A UML Notation for Aspect-Oriented Software Design".
  10. M. M. Kandé, J. Kienzle, and A. Strohmeier, "From AOP to UML: Towards an Aspect-Oriented Architectural Modeling Approach".
  11. Third International Workshop on Aspect-Oriented Modeling. On-line at http://lglwww.epfl.ch/workshops/aosd2003/
  12. Tool for automatic J2EE deployment of secureUML: http://www.io- software.com/products/data/mda_security_factsheet_020902.pdf
  13. B. De Win, B. Vanhaute, and B. De Decker, "Security Through Aspect-Oriented Programming, Advances in Network and Distributed Systems Security". B. De Decker, F. Piessens, J. Smits and E. Van Herreweghen, eds. Kluwer Academic Publishers, 2001, pp. 125-138.
  14. M. Abadi, "Built-in Object Security", In proceedings of ECOOP 2003, Darmstadt, Germany, July 2003.
  15. J. Jürjens, "Model-based Security with UMLsec", UML Forum, Tokyo, April 2003.
  16. Splint homepage. http://www.splint.org/
  17. RATS tool, http://www.securesoftware.com/download_form_rats.htm
  18. D.A. Wheeler, Secure Programming for Linux and Unix. On-line at http://www.dwheeler.com/secure-programs/
  19. Autofocus homepage: http://autofocus.in.tum.de/index-e.html