TY - CHAP
T1 - Designing secure software by testing application of security patterns
AU - Kobashi, Takanori
AU - Washizaki, Hironori
AU - Yoshioka, Nobukazu
AU - Kaiya, Haruhiko
AU - Okubo, Takao
AU - Fukazawa, Yoshiaki
N1 - Publisher Copyright:
© 2019, IGI Global.
PY - 2019/1/25
Y1 - 2019/1/25
N2 - Simply confirming potential threats and vulnerabilities in an early stage of the development process (e.g., the requirement or design phase) is insufficient because software developers are not necessarily security experts. Additionally, even if the software design considers security at an early stage, whether the software actually satisfies the security requirements must be confirmed. To realize secure design, the authors propose an application to design software systems with verification of security patterns using model testing. The method provides extended security patterns, which include requirement- and design-level patterns as well as a new designing and model testing process that uses these patterns. Once developers specify threats and vulnerabilities in the target system in an early stage of development, the method can verify whether the security patterns are properly applied and assess if the vulnerabilities are resolved.
AB - Simply confirming potential threats and vulnerabilities in an early stage of the development process (e.g., the requirement or design phase) is insufficient because software developers are not necessarily security experts. Additionally, even if the software design considers security at an early stage, whether the software actually satisfies the security requirements must be confirmed. To realize secure design, the authors propose an application to design software systems with verification of security patterns using model testing. The method provides extended security patterns, which include requirement- and design-level patterns as well as a new designing and model testing process that uses these patterns. Once developers specify threats and vulnerabilities in the target system in an early stage of development, the method can verify whether the security patterns are properly applied and assess if the vulnerabilities are resolved.
UR - http://www.scopus.com/inward/record.url?scp=85070362832&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85070362832&partnerID=8YFLogxK
U2 - 10.4018/978-1-5225-6313-6.ch006
DO - 10.4018/978-1-5225-6313-6.ch006
M3 - Chapter
AN - SCOPUS:85070362832
SN - 9781522563136
SP - 136
EP - 169
BT - Exploring Security in Software Architecture and Design
PB - IGI Global
ER -