Reusable secure connectors for secure software architecture

Michael Shin, Hassan Gomaa, Don Pathirage

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


This paper describes the design of reusable secure connectors that are used in the design of secure software architectures for distributed software applications. The secure connectors are designed separately from application components by reusing the appropriate communication pattern between components as well as the security services required by these components. Each secure connector is designed as a composite component that encapsulates both security service components and communication pattern components. Integration of security services and communication patterns within a secure connector is provided by a security coordinator. The main advantage is that secure connectors can be reused in different applications. In this paper, secure connectors are reused in electronic commerce and automated teller machine applications.

Original languageEnglish
Title of host publicationSoftware Reuse
Subtitle of host publicationBridging with Social-Awareness - 15th International Conference, ICSR 2016, Proceedings
EditorsGeorgia M. Kapitsaki, Eduardo Santana de Almeida
Number of pages16
ISBN (Print)9783319351216
StatePublished - 2016
Event15th International Conference on Software Reuse, ICSR 2016 - Limassol, Cyprus
Duration: Jun 5 2016Jun 7 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference15th International Conference on Software Reuse, ICSR 2016


  • Component-based software architecture
  • Dynamic modeling
  • Message communication patterns
  • Reusable secure connector
  • Secure software architecture
  • Secure software design


Dive into the research topics of 'Reusable secure connectors for secure software architecture'. Together they form a unique fingerprint.

Cite this