Academia.eduAcademia.edu

Outline

Software engineering for secure systems

https://doi.org/10.1109/ICSE.2005.1553652

Abstract
sparkles

AI

This workshop summary from SESS'05 discusses techniques for building and validating secure applications, bringing together experts from software engineering and security. The workshop featured presentations on architectural security, evaluation of trust and risk, and specific methodologies for enhancing application security. Key insights included the intrinsic complexity of software, the need for effective elicitation and validation of security requirements, and the importance of run-time monitoring in enforcing security policies.

References (15)

  1. O. E. Demir, P. Devanbu, N. Medvidovic, and E. Wohlstadter, "DISCOA: architectural adaptions for security and QoS,
  2. M. Rits, B. D. Boe, and A. Schaad, "XacT: a bridge between resource management and access control in multilayered applications"
  3. S. Banerjee, C. A. Mattmann, N. Medvidovic, and L. Golubchik, "Leveraging architectural models to inject trust into software systems"
  4. J. Ren, R. Taylor, P. Dourish, and D. Redmiles, "Towards an architectural treatment of software security: A connector-centric approach"
  5. B. D. Win, F. Piessens, J. Smans, and W. Joosen, "Towards a unifying view on security contracts"
  6. T. Verhanneman, F. Piessens, B. D. Win, and W. Joosen, "Requirements traceability to support evolution of access control"
  7. S.-W. Lee, R. Gandhi, and G.-J. Ahn, "Establishing trustworthiness in services of the critical infrastructure through certication and accreditation"
  8. Z. Dwaikat and F. Parisi-Presicce, "Risky trust: Risk-based analysis of software systems"
  9. N. R. Mead and T. Stehney, "Security quality requirements engineering (SQUARE) methodology"
  10. K. Sohr, L. Migge, and G.-J. Ahn, "Articulating and enforcing authorisation policies with UML and OCL"
  11. B. Breech and L. Pollock, "A framework for testing security mechanisms for program-based attacks"
  12. S. Weber, P. Karger, and A. Paradkar, "A software flaw taxonomy: Aiming tools at security"
  13. W. Masri and A. Podgurski, ¡ÈUsing dynamic information flow analysis to detect attacks against applications"
  14. M. Jochen, A. A. Anteneh, L. Pollock, and L. Marvel, "Enabling control over adaptive program transformation for dynamically evolving mobile software validation"
  15. M. Gegick and L. Williams, "Matching attack patterns to security vulnerabilities in software-intensive system designs"