Visible to the public Deals with Integrating of Security Specifications During Software Design Phase Using MDA Approach

TitleDeals with Integrating of Security Specifications During Software Design Phase Using MDA Approach
Publication TypeConference Paper
Year of Publication2017
AuthorsAbdellatif, Lasbahani, Chhiba, Mostafa, Mjihil, Oussama
Conference NameProceedings of the Second International Conference on Internet of Things, Data and Cloud Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4774-7
Keywordsauthorization policies, code generation, code generator, composability, Human Behavior, human factor, Metrics, model transformations, model-driven architecture, ocl, pubcrawl, Repudiation, resilience, Resiliency, security profile
AbstractThere are many recent propositions treating Model Driven Architecture (MDA) approaches to perform and automate code generation from design models. To the best of our knowledge and research, most of these propositions have been only focused on functional aspect by allowing code generation without considering this the non-functional aspect at the same time so that to generate secure object-oriented software basing on MDA approach. In this context, we are adding further details to integrate the security policies required in the form of secure models. The systems specification models will be enhanced with security requirements at different abstraction levels through a set of transformation models. Improving functional models with security constraints allow us to incorporate the security needs and automating generating secure applications with their security infrastructure using MDA approach. After carrying out a modification on MDA processes and UML meta-model to cover a better representation of security policies of an organization by updating different existing software engineering process to take into account nonfunctional aspect along with their functional aspect. This work presents a new methodology based on MDA approach and existing security technologies for allowing the integration of the proposed security requirements, which are obtained from security experts, during the system design. Within this context, we have focused on the essential elements of security, such as data encryption, Message Integrity, and Access Control in order to express the importance of merging both the functional and non-functional aspects altogether. We have chosen these properties to practically illustrate how to generate secure applications including their security policies. Then the source code will be obtained automatically from Platform Specific Models (PSM) by applying a set of model transformations and using a code generator designed for this mission. In addition, we can inject also other security-related properties, such as Availability, Traceability, non-repudiation, and Scalability issues during the whole development process by following the same methodology. these properties will be treated in the future work.
URLhttp://doi.acm.org/10.1145/3018896.3065835
DOI10.1145/3018896.3065835
Citation Keyabdellatif_deals_2017