2009 Second International Conference on Dependability 2009
DOI: 10.1109/depend.2009.23
|View full text |Cite
|
Sign up to set email alerts
|

Development of Applications Based on Security Patterns

Abstract: Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software complexity and the specific expertise needed for the integration of modern security solutions. In this paper we present the SERENITY Project which proposes a framework addressing this issue. SERENITY is based on the separation of the development of security solutions from the development of secure software supported by these security solutions. Both developments, security solutions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…In the future, we plan to validate the results obtained after implementing BC technology and to combine the findings with AI and federated learning to create a useful, real-time generalized model. As previously suggested, and as reinforced by current demand, reliable security solutions must be integrated into all digital platforms and must be capable of adaptation to new environments [94,95]. We will seek BC technology that is secure across all applications.…”
Section: Discussionmentioning
confidence: 98%
“…In the future, we plan to validate the results obtained after implementing BC technology and to combine the findings with AI and federated learning to create a useful, real-time generalized model. As previously suggested, and as reinforced by current demand, reliable security solutions must be integrated into all digital platforms and must be capable of adaptation to new environments [94,95]. We will seek BC technology that is secure across all applications.…”
Section: Discussionmentioning
confidence: 98%
“…It appears very suitable for our protocol, since it requires several message exchanges and sequential steps (generation, filling, and emptying of tokens). Another interesting framework that could be applied during the security design and development of our protocol is [45].…”
Section: Discussionmentioning
confidence: 99%
“…Both data hiding [1,2] and message encryption [3,4] can be used to transmit secret information in secure communication [5]. The confusion in encrypted messages easily catches attackers' attention.…”
Section: Introductionmentioning
confidence: 99%