Embedding security patterns into a domain model

Detalles Bibliográficos
Autor Principal: Solinas, Miguel
Otros autores o Colaboradores: Antonelli, Rubén Leandro, Fernandez, Eduardo B.
Formato: Capítulo de libro
Lengua:español
Temas:
Acceso en línea:www.computer.org/portal/web/csdl/doi/10.1109/DEXA.2009.44
Consultar en el Cátalogo
Resumen:Incorporating security patterns at every stage of software development process is one of the most effective ways to build secure software. But how early in the software development process is it possible to apply security patterns? We present here an approach to define security requirements in order to identify security patterns in the very early stages of the software development process, we also an experience with the method in a limited environment. We use natural language to express requirements (understandable to the Requirements Engineer as well as to the Domain Expert), which it is possible to identify the security requirements the corresponding security patterns. Language Extended Lexicon (LEL) scenarios allow to understand, study, model the security domain to represent security patterns. To them we apply the Baseline Mentor Workbench (BMW) for deriving CRC (Class Responsibility Collaboration) cards that represent the security patterns their contextual model domain. BMW is a tool to assist the domain expert during the requirements engineering stage.
Notas:Formato de archivo: PDF. -- Este documento es producción intelectual de la Facultad de Informática-UNLP (Colección BIPA / Biblioteca.) -- Disponible también en línea (Cons. 03/05/2011)
Descripción Física:Datos electrónicos (1 archivo: 359 KB)

MARC

LEADER 00000naa a2200000 a 4500
003 AR-LpUFIB
005 20250423183022.0
008 230201s2009 ag o 000 0 spa d
024 8 |a DIF-M3120  |b 3225  |z DIF003031 
040 |a AR-LpUFIB  |b spa  |c AR-LpUFIB 
100 1 |a Solinas, Miguel  |9 46996 
245 1 0 |a Embedding security patterns into a domain model 
300 |a Datos electrónicos (1 archivo: 359 KB) 
500 |a Formato de archivo: PDF. -- Este documento es producción intelectual de la Facultad de Informática-UNLP (Colección BIPA / Biblioteca.) -- Disponible también en línea (Cons. 03/05/2011) 
520 |a Incorporating security patterns at every stage of software development process is one of the most effective ways to build secure software. But how early in the software development process is it possible to apply security patterns? We present here an approach to define security requirements in order to identify security patterns in the very early stages of the software development process, we also an experience with the method in a limited environment. We use natural language to express requirements (understandable to the Requirements Engineer as well as to the Domain Expert), which it is possible to identify the security requirements the corresponding security patterns. Language Extended Lexicon (LEL) scenarios allow to understand, study, model the security domain to represent security patterns. To them we apply the Baseline Mentor Workbench (BMW) for deriving CRC (Class Responsibility Collaboration) cards that represent the security patterns their contextual model domain. BMW is a tool to assist the domain expert during the requirements engineering stage. 
534 |a International Workshop on Database Expert Systems Application (20th : 2009 : Linz) 
650 4 |a SEGURIDAD Y PROTECCIÓN  |9 42830 
650 4 |a TARJETAS CRC  |9 44447 
650 4 |a PROGRAMACIÓN ORIENTADA A OBJETOS  |9 42796 
700 1 |a Antonelli, Rubén Leandro  |9 44748 
700 1 |a Fernandez, Eduardo B.  |9 46997 
856 4 0 |u www.computer.org/portal/web/csdl/doi/10.1109/DEXA.2009.44 
942 |c CP 
952 |0 0  |1 0  |4 0  |6 A0233  |7 3  |9 77716  |a DIF  |b DIF  |d 2025-03-11  |l 0  |o A0233  |r 2025-03-11 17:03:03  |w 2025-03-11  |y CP 
999 |c 52885  |d 52885