Reusable secure connectors for secure software architecture

Michael Shin, Hassan Gomaa, Don Pathirage

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

This paper describes the design of reusable secure connectors that are used in the design of secure software architectures for distributed software applications. The secure connectors are designed separately from application components by reusing the appropriate communication pattern between components as well as the security services required by these components. Each secure connector is designed as a composite component that encapsulates both security service components and communication pattern components. Integration of security services and communication patterns within a secure connector is provided by a security coordinator. The main advantage is that secure connectors can be reused in different applications. In this paper, secure connectors are reused in electronic commerce and automated teller machine applications.

Original languageEnglish
Title of host publicationSoftware Reuse
Subtitle of host publicationBridging with Social-Awareness - 15th International Conference, ICSR 2016, Proceedings
EditorsGeorgia M. Kapitsaki, Eduardo Santana de Almeida
PublisherSpringer-Verlag
Pages181-196
Number of pages16
ISBN (Print)9783319351216
DOIs
StatePublished - 2016
Event15th International Conference on Software Reuse, ICSR 2016 - Limassol, Cyprus
Duration: Jun 5 2016Jun 7 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9679
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Software Reuse, ICSR 2016
CountryCyprus
CityLimassol
Period06/5/1606/7/16

Keywords

  • Component-based software architecture
  • Dynamic modeling
  • Message communication patterns
  • Reusable secure connector
  • Secure software architecture
  • Secure software design

Fingerprint Dive into the research topics of 'Reusable secure connectors for secure software architecture'. Together they form a unique fingerprint.

Cite this