Reference Hub1
Designing Secure Software by Testing Application of Security Patterns

Designing Secure Software by Testing Application of Security Patterns

Takanori Kobashi, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo, Yoshiaki Fukazawa
Copyright: © 2019 |Pages: 34
ISBN13: 9781522563136|ISBN10: 152256313X|ISBN13 Softcover: 9781522586135|EISBN13: 9781522563143
DOI: 10.4018/978-1-5225-6313-6.ch006
Cite Chapter Cite Chapter

MLA

Kobashi, Takanori, et al. "Designing Secure Software by Testing Application of Security Patterns." Exploring Security in Software Architecture and Design, edited by Michael Felderer and Riccardo Scandariato, IGI Global, 2019, pp. 136-169. https://doi.org/10.4018/978-1-5225-6313-6.ch006

APA

Kobashi, T., Washizaki, H., Yoshioka, N., Kaiya, H., Okubo, T., & Fukazawa, Y. (2019). Designing Secure Software by Testing Application of Security Patterns. In M. Felderer & R. Scandariato (Eds.), Exploring Security in Software Architecture and Design (pp. 136-169). IGI Global. https://doi.org/10.4018/978-1-5225-6313-6.ch006

Chicago

Kobashi, Takanori, et al. "Designing Secure Software by Testing Application of Security Patterns." In Exploring Security in Software Architecture and Design, edited by Michael Felderer and Riccardo Scandariato, 136-169. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-6313-6.ch006

Export Reference

Mendeley
Favorite

Abstract

Simply confirming potential threats and vulnerabilities in an early stage of the development process (e.g., the requirement or design phase) is insufficient because software developers are not necessarily security experts. Additionally, even if the software design considers security at an early stage, whether the software actually satisfies the security requirements must be confirmed. To realize secure design, the authors propose an application to design software systems with verification of security patterns using model testing. The method provides extended security patterns, which include requirement- and design-level patterns as well as a new designing and model testing process that uses these patterns. Once developers specify threats and vulnerabilities in the target system in an early stage of development, the method can verify whether the security patterns are properly applied and assess if the vulnerabilities are resolved.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.