Modeling complex systems by separating application and security concerns

Hassan Gomaa, Michael Eonsuk Shin

Research output: Contribution to conferencePaperpeer-review

17 Scopus citations

Abstract

This paper describes how to model complex applications by modeling application requirements and designs separately from security requirements and designs using the UML notation. By careful separation of concerns, the security requirements are captured in security use cases and encapsulated in security objects separately from the application requirements and objects. The approach reduces system complexity caused by mixing security requirements with business application requirements with the goal of making complex systems more maintainable. Furthermore, the security use cases and objects can be reused by other software applications.

Original languageEnglish
Pages19-28
Number of pages10
StatePublished - 2004
EventProceedings - Ninth IEEE International Conference on Engineering Complex Computer System: Navigating Complexity in the e-Engineering Age, ICECCS 2004 - Florence, Italy
Duration: Apr 14 2004Apr 16 2004

Conference

ConferenceProceedings - Ninth IEEE International Conference on Engineering Complex Computer System: Navigating Complexity in the e-Engineering Age, ICECCS 2004
CountryItaly
CityFlorence
Period04/14/0404/16/04

Fingerprint Dive into the research topics of 'Modeling complex systems by separating application and security concerns'. Together they form a unique fingerprint.

Cite this