Abstract
Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to be bypassed resulting in a security breach. Methodologies are needed for incorporating security mechanisms in an application and assessing whether the resulting system is indeed secure. We propose one such methodology for designing secure applications. We begin by identifying the assets in the application that need protection. We then find the kinds of attacks that are typical for such applications. We show how to evaluate the application against such attacks. If the results are unacceptable, that is, they pose a high security risk, then some security mechanism must be incorporated into the application. We illustrate how this can be done and show how the resulting system can be evaluated to give assurance that it is resilient to the given attack.
Keywords
- Primary Model
- Sequence Diagram
- Security Mechanism
- Signed Message
- Secure Application
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Chapter PDF
References
Australian/New Zealand Standards. AS/NZS 4360:2004 Risk Management (2004)
Australian/New Zealand Standards. HB 436:2004 Risk Management Guidelines – Companion to AS/NZS 4360:2004 (2004)
Barber, B., Davey, J.: The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems. In: Lun, K.C., Degoulet, P., Piemme, T.E., Rienhoff, O. (eds.) Proceedings of MEDINFO 1992, pp. 1589–1593. North Holland Publishing Co., Amsterdam (1992)
Clarke, S.: Extending standard UML with model composition semantics. Science of Computer Programming 44(1), 71–100 (2002)
Clarke, S., Banaissad, E.: Aspect-oriented analysis and design. Addison-Wesley Professional, Boston (2005)
ISO 15408:1999 Common Criteria for Information Technology Security Evaluation. Version 2.1, CCIMB–99–031, CCIMB-99-032, CCIMB-99-033 (August 1999)
CORAS. IST-2000-25031 CORAS: A Platform for risk analysis of security critical systems. (2000-2003) (accessed February 18, 2006), http://sourceforge.net/projects/coras
France, R., Dim, D.-K., Ghosh, S., Song, E.: A UML-based pattern specification technique. IEEE Transactions on Software Engineering 3(30), 193–206 (2004)
France, R., Ray, I., Georg, G., Ghosh, S.: Aspect–oriented approach to design modeling. IEE Proceedings on Software 4(151), 173–185 (2004)
TLS: Network Working Group. The TLS Protocol Version 1.0, RFC 2246 (January 1999)
Houmb, S.H., Georg, G., France, R., Bieman, J., Jürjens, J.: Cost-benefit trade-off analysis using bbn for aspect-oriented risk-driven development. In: Proceedings of Tenth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2005), pp. 195–204 (June 2005)
Houmb, S.H., Georg, G.: The Aspect-Oriented Risk-Driven Development (AORDD) Framework. In: Benediktsson, O., et al. (eds.) Proceedings of the International Conference on Software Development (SWDC–REX), SWDC–REX Conference Proceedings, Gutenberg, pp. 81–91 (2005)
International Organization for Standardization (ISO/IEC). ISO/IEC 17799:2000 Information technology – Code of Practice for information security management (2000)
International Organization for Standardization (ISO/IEC). ISO/IEC TR 13335:2001 Information technology – Guidelines for management of IT Security (2001)
Jacobson, I.: Case for aspects – Part I. Software Development Magazine, 32–37 (October 2003)
Jacobson, I.: Case for aspects – Part II. Software Development Magazine, 42–48 (November 2003)
Jürjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)
Kasman, R., Asundi, J., Klein, M.: Making architecture design decisions: an economic approachn. Technical report CMU/SEI-2002-TR-035, CMU/SEI (2002), http://www.sei.cmu.edu/pub/documents/02.reorts/pdf/02tr03.pdf
Kazman, R., Klein, M., Clements, P.: Atam: method for architecture evaluation. Technical report CMU/SEI-2000-TR-004, CMU/SEI (2000), http://www.sei.cmu.edu/pub/document/00.reports/pdf/00tr004.pdf
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: Getting stared with aspectj. Communications of the ACM 10(44), 59–65 (2001)
Stølen, K., den Braber, F., Dimitrakos, T., Fredriksen, R., Gran, B.A., Houmb, S.H., Stamatiou, Y.C., Aagedal, J.Ø.: Model–based risk assessment in a component-based software engineering process: The CORAS approach to identify security risks. In: Barbier, F. (ed.) Business Component-Based Software Engineering, pp. 189–207. Kluwer, Dordrecht (2002)
Straw, G., Georg, G., Song, E., Ghosh, S., France, R., Bieman, J.: Model composition directives. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) UML 2004. LNCS, vol. 3273, pp. 84–97. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Georg, G., Houmb, S.H., Ray, I. (2006). Aspect-Oriented Risk Driven Development of Secure Applications. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_20
Download citation
DOI: https://doi.org/10.1007/11805588_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36796-3
Online ISBN: 978-3-540-36799-4
eBook Packages: Computer ScienceComputer Science (R0)
