Square-planar tetranuclear clusters [M 4 (L)(AcO) 4 (µ 4 -OH)] -(M = Mn II , Co II , and Ni II ) are synthesized using tetra-anionic p-tert-butylsulfonylcalix [4]arene (L 4-) as a cluster-forming ligand. Three complexes are crystallographically isostructural, being crystallized in the triclinic crystal system with space group P1. The calix[4]arene acts as a tetrakis fac-tridentate ligand through four phenoxo and four sulfonyl oxygen atoms to form square arrangement of four metal ions, which are further bridged by four chelating acetate ions and one hydroxo ion in a µ 4 manner to complete the hexacoordination of each metal center. Although the whole molecule of each complex is crystallographically independent, the molecule is
Although security patterns contain security expert knowledge to support software developers, these patterns may be inappropriately applied because most developers are not security specialists, leading to threats and vulnerabilities. Here we propose a validation method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, which consists of the "aspect test template" to observe the internal processing and the "test case template". Providing design information creates a test from the test template. Because a test template is recyclable, it can create easily a test, which can validate the security design patterns. As a case study, we applied our method to a web system. The result shows that our method can test repetition in the early stage of implementation, verify pattern applications, and assess whether vulnerabilities are resolved.
Software developers are not necessarily security experts, confirming potential threats and vulnerabilities at an early stage of the development process (e.g., in the requirement- and design-phase) is insufficient. Additionally, even if designed software considers security at an early stage, whether the software really satisfies the security requirements must be confirmed. To realize secure design, this work proposes an application to validate security patterns using model testing. Its method provides extended security patterns, which include requirement- and design-level patterns as well as a new model testing process using these patterns. After a developer specifies threats and vulnerabilities in the target system during an early stage of development, this method can validate whether the security patterns are properly applied and assess if these vulnerabilities are resolved.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.