2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.31
|View full text |Cite
|
Sign up to set email alerts
|

Verifying Implementation of Security Design Patterns Using a Test Template

Abstract: Although security patterns contain security expert knowledge to support software developers, these patterns may be inappropriately applied because most developers are not security specialists, leading to threats and vulnerabilities. Here we propose a validation method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, which consists of the "aspect test template" to observe the internal processing and the "test cas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 13 publications
(10 reference statements)
0
7
0
Order By: Relevance
“…Because the majority of reports create a unique tool, there are many tools for modeling, analysis, design, and implementation. However, few studies propose testing tools (such as model-based testing [179,209]) and operating tools (such a runtime framework [40,171,173,199]).…”
Section: Tool and Automationmentioning
confidence: 99%
“…Because the majority of reports create a unique tool, there are many tools for modeling, analysis, design, and implementation. However, few studies propose testing tools (such as model-based testing [179,209]) and operating tools (such a runtime framework [40,171,173,199]).…”
Section: Tool and Automationmentioning
confidence: 99%
“…2) Security Pattern Testing: the verification of patterns on models was studied in [26], [27], [28], [4], [29]. In these papers, pattern goals or intents or structural properties are specified with UML sequence diagrams [26] with expressions written with the Object Constraint Language (OCL) [27], [28], [4] or with LTL properties [29]. The pattern features are then checked on UML models.…”
Section: Related Workmentioning
confidence: 99%
“…The authors design the IoT system with class and sequence diagrams for these five patterns. Masatoshi Yoshizawa et al [18], proposed the validation method for security design patterns by creating the aspect test template and Test case template to support the developer during the implementation. Arnon Sturm et al [19] proposed method for implementing security patterns database applications which preserves the access control.…”
Section: Related Workmentioning
confidence: 99%