•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • ProfDoc
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • ProfDoc
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Quality-centric security pattern mutations

Author:
عبّاس جوان جعفری بجنوردی
,
عباس رسول زادگان
,
Abbas Javan Jafari
,
Abbas Rasoolzadegan
Year
: 2019
Abstract: Security patterns are a means to encapsulate and communicate proven security solutions. They are well-established approaches for integrating security into the software development process. The literature includes a large array of security patterns categorized into various catalogs, from which the designers can choose a pattern suitable to the problem at hand. Previous efforts to choose appropriate security patterns have only considered the different functionality of the patterns. However, the solution structure of the chosen pattern will integrate with the overall software design and therefore affect many quality attributes such as flexibility and security. Thus, nonfunctional requirements should also be taken into account when opting to add a pattern to an existing software design. This will allow the designers to choose between alternative solutions not solely based on functionality, but also the quality requirements put forth by different stakeholders. We propose the concept of quality-centric security pattern mutations which are created by mutating current patterns using design refactoring rules. These mutations offer the same behavior as the initial pattern but with varying effects on quality attributes such as flexibility, reusability, extendibility, and security. We have selected two well-established access-control patterns as our case studies. We have used both object-oriented quality metrics and design security assessment metrics for quality evaluation and utilized petri-nets to analyze behavior preservation. Our assessments demonstrate that the newly created mutations offer varying levels of quality while preserving the original pattern functionality.
DOI: 10.1007/s11219-019-09454-5
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/3368059
Keyword(s): Security Patterns,Software Quality,Object-Oriented metrics,Security Evaluation,Refactoring
Collections :
  • ProfDoc
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Quality-centric security pattern mutations

Show full item record

contributor authorعبّاس جوان جعفری بجنوردیen
contributor authorعباس رسول زادگانen
contributor authorAbbas Javan Jafarifa
contributor authorAbbas Rasoolzadeganfa
date accessioned2020-06-06T13:45:48Z
date available2020-06-06T13:45:48Z
date issued2019
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/3368059?locale-attribute=en
description abstractSecurity patterns are a means to encapsulate and communicate proven security solutions. They are well-established approaches for integrating security into the software development process. The literature includes a large array of security patterns categorized into various catalogs, from which the designers can choose a pattern suitable to the problem at hand. Previous efforts to choose appropriate security patterns have only considered the different functionality of the patterns. However, the solution structure of the chosen pattern will integrate with the overall software design and therefore affect many quality attributes such as flexibility and security. Thus, nonfunctional requirements should also be taken into account when opting to add a pattern to an existing software design. This will allow the designers to choose between alternative solutions not solely based on functionality, but also the quality requirements put forth by different stakeholders. We propose the concept of quality-centric security pattern mutations which are created by mutating current patterns using design refactoring rules. These mutations offer the same behavior as the initial pattern but with varying effects on quality attributes such as flexibility, reusability, extendibility, and security. We have selected two well-established access-control patterns as our case studies. We have used both object-oriented quality metrics and design security assessment metrics for quality evaluation and utilized petri-nets to analyze behavior preservation. Our assessments demonstrate that the newly created mutations offer varying levels of quality while preserving the original pattern functionality.en
languageEnglish
titleQuality-centric security pattern mutationsen
typeJournal Paper
contenttypeExternal Fulltext
subject keywordsSecurity Patternsen
subject keywordsSoftware Qualityen
subject keywordsObject-Oriented metricsen
subject keywordsSecurity Evaluationen
subject keywordsRefactoringen
identifier doi10.1007/s11219-019-09454-5
journal titleSoftware Quality Journalfa
pages1531-1561
journal volume27
journal issue4
identifier linkhttps://profdoc.um.ac.ir/paper-abstract-1074782.html
identifier articleid1074782
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace