Defining security architectural patterns based on viewpoints

  • Authors:
  • David G. Rosado;Carlos Gutiérrez;Eduardo Fernández-Medina;Mario Piattini

  • Affiliations:
  • ALARCOS Research Group, Information Systems and Technologies Department, Research and Development Institute, University of Castilla-La Mancha Paseo de la Universidad, Ciudad Real, Spain;Correos Telecom, Madrid, Spain;ALARCOS Research Group, Information Systems and Technologies Department, Research and Development Institute, University of Castilla-La Mancha Paseo de la Universidad, Ciudad Real, Spain;ALARCOS Research Group, Information Systems and Technologies Department, Research and Development Institute, University of Castilla-La Mancha Paseo de la Universidad, Ciudad Real, Spain

  • Venue:
  • ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, there has been a growing interest in identifying security patterns in software-intensive systems since they provide techniques for considering, detecting and solving security issues from the beginning of its development life-cycle. This paper describes how security architectural patterns lack of a comprehensive and complete well-structured documentation that conveys essential information of its logical structure, run-time behaviour, deployment-time and monitoring configuration, and so on. Thus we propose a set of security viewpoints to describe software-intensive security patterns adhered to ANSI/IEEE 1471-2000. In order to maximize comprehensibility, we make use of well-known language notations such as UML to represent all the necessary information for defining a software-intensive architectural security pattern conforming to the IEEE 1471-2000 standard. We investigate security architectural patterns from several IEEE 1471-2000 compliant viewpoints.