Abstract
Security design principles introduced in Chap. 24 are applied to the Address Book Application (ABA) and Personal Finances case studies. Various design models are used to express the security design in each case study. Sample code is used to describe some implementation details.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Reference
National Institute of Standards and Technology: Secure Hash Standard (SHS). NIST (2015) https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf. Accessed June 26 2019
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Voorhees, D.P. (2020). OOD Case Study: More Security Requirements. In: Guide to Efficient Software Design. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-28501-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-28501-2_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28500-5
Online ISBN: 978-3-030-28501-2
eBook Packages: Computer ScienceComputer Science (R0)