Separating application and security concerns in use case models

Hassan Gomaa, Michael E. Shin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper describes an approach to model complex applications by modeling application requirements separately from security requirements in use case models. By careful separation of concerns, the security requirements are captured in security use cases separately from the application requirements, which are captured in application use cases. The approach reduces system complexity caused by mixing security requirements with business application requirements with the goal of making complex systems more maintainable. Furthermore, the security use cases can be reused by other software applications. This paper describes how the application and security concerns are modeled separately, and how they can be woven together into an application.

Original languageEnglish
Title of host publicationProceedings of the 15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09
Pages1-5
Number of pages5
DOIs
StatePublished - 2009
Event15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09 - Charlottesville, VA, United States
Duration: Mar 2 2009Mar 6 2009

Publication series

NameProceedings of the 15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09

Conference

Conference15th Workshop on Early Aspects, EA '09, Co-located with the 8th International Conference on Aspect-Oriented Software Development, AOSD.09
CountryUnited States
CityCharlottesville, VA
Period03/2/0903/6/09

Keywords

  • security
  • separation of concerns
  • use case models
  • weaving

Fingerprint Dive into the research topics of 'Separating application and security concerns in use case models'. Together they form a unique fingerprint.

Cite this