Embedding security patterns into a domain model
Material type:
Item type | Home library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Biblioteca de la Facultad de Informática | A0233 (Browse shelf(Opens below)) | No corresponde |
Formato de archivo: PDF. -- Este documento es producción intelectual de la Facultad de Informática-UNLP (Colección BIPA / Biblioteca.) -- Disponible también en línea (Cons. 03/05/2011)
Incorporating security patterns at every stage of software development process is one of the most effective ways to build secure software. But how early in the software development process is it possible to apply security patterns? We present here an approach to define security requirements in order to identify security patterns in the very early stages of the software development process, we also an experience with the method in a limited environment. We use natural language to express requirements (understandable to the Requirements Engineer as well as to the Domain Expert), which it is possible to identify the security requirements the corresponding security patterns. Language Extended Lexicon (LEL) scenarios allow to understand, study, model the security domain to represent security patterns. To them we apply the Baseline Mentor Workbench (BMW) for deriving CRC (Class Responsibility Collaboration) cards that represent the security patterns their contextual model domain. BMW is a tool to assist the domain expert during the requirements engineering stage.
International Workshop on Database Expert Systems Application (20th : 2009 : Linz)