An aspect-oriented methodology for designing secure applications

  • Authors:
  • Geri Georg;Indrakshi Ray;Kyriakos Anastasakis;Behzad Bordbar;Manachai Toahchoodee;Siv Hilde Houmb

  • Affiliations:
  • Computer Science Department, Colorado State University, 1873 Campus Delivery, Fort Collins, CO 80528, USA;Computer Science Department, Colorado State University, 1873 Campus Delivery, Fort Collins, CO 80528, USA;School of Computer Science, University of Birmingham, Edgbaston, Birmingham, UK;School of Computer Science, University of Birmingham, Edgbaston, Birmingham, UK;Computer Science Department, Colorado State University, 1873 Campus Delivery, Fort Collins, CO 80528, USA;Department of Computer Science, University of Twente, Enschede, Netherlands

  • Venue:
  • Information and Software Technology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a methodology, based on aspect-oriented modeling (AOM), for incorporating security mechanisms in an application. The functionality of the application is described using the primary model and the attacks are specified using aspects. The attack aspect is composed with the primary model to obtain the misuse model. The misuse model describes how much the application can be compromised. If the results are unacceptable, then some security mechanism must be incorporated into the application. The security mechanism, modeled as security aspect, is composed with the primary model to obtain the security-treated model. The security-treated model is analyzed to give assurance that it is resilient to the attack.