2015
DOI: 10.18760/ic.14120152
|View full text |Cite
|
Sign up to set email alerts
|

Formalization of Web Security Patterns

Abstract: Abstract. Security issues in software industries become more and more challenging due to malicious attacks and as a result, it leads to exploration of various security holes in software system. In order to secure the information assets associated with any software system, organizations plan to design the system based on a number of security patterns, useful to build and test new security mechanisms. These patterns are nothing but certain design guidelines. But they have certain limitations in terms of consiste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 18 publications
(14 reference statements)
0
5
0
Order By: Relevance
“…Alzahrani [18] demonstrated the use of codecharts for formal specification and verification of security patterns in terms of generalisation and abstraction. Dwivedi and Rath [19,20] presented verification of five security patterns of web applications and one security pattern of Service-Oriented Architecture (SOA) using Alloy [21]. The security patterns verified by Dwivedi and Rath [19,20] are secure proxy, single-sign-on, check point, authenticator, and access policy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Alzahrani [18] demonstrated the use of codecharts for formal specification and verification of security patterns in terms of generalisation and abstraction. Dwivedi and Rath [19,20] presented verification of five security patterns of web applications and one security pattern of Service-Oriented Architecture (SOA) using Alloy [21]. The security patterns verified by Dwivedi and Rath [19,20] are secure proxy, single-sign-on, check point, authenticator, and access policy.…”
Section: Related Workmentioning
confidence: 99%
“…Dwivedi and Rath [19,20] presented verification of five security patterns of web applications and one security pattern of Service-Oriented Architecture (SOA) using Alloy [21]. The security patterns verified by Dwivedi and Rath [19,20] are secure proxy, single-sign-on, check point, authenticator, and access policy.…”
Section: Related Workmentioning
confidence: 99%
“…• transforming UML models of security patterns to Alloy [15] and using the Alloy Analyzer to check the incon-sistencies and ambiguities within security patterns [10]. Five security patterns were studied.…”
Section: A Verification Of Security Patternsmentioning
confidence: 99%
“…Furthermore, no detailed model checking result was given. In [5], a formal modeling approach for composing security patterns for web-based applications was proposed. This approach uses UML to model the security patterns and their composition and then transforms the UML model to Alloy (a formal specification language based on first order logic) formal specification for security property analysis.…”
Section: Related Workmentioning
confidence: 99%