ASE: A comprehensive pattern-driven security methodology for distributed systems

Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of security features should proceed by means of a structured, systematic approach, co...

Full description

Saved in:
Bibliographic Details
Published inComputer standards and interfaces Vol. 41; pp. 112 - 137
Main Authors Uzunov, Anton V., Fernandez, Eduardo B., Falkner, Katrina
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.09.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of security features should proceed by means of a structured, systematic approach, combining principles from both software and security engineering. Such systematic approaches, particularly those implying some sort of process aligned with the development life-cycle, are termed security methodologies. There are a number of security methodologies in the literature, of which the most flexible and, according to a recent survey, most satisfactory from an industry-adoption viewpoint are methodologies that encapsulate their security solutions in some fashion, especially via the use of security patterns. While the literature does present several mature pattern-driven security methodologies with either a general or a highly specific system applicability, there are currently no (pattern-driven) security methodologies specifically designed for general distributed systems. Going further, there are also currently no methodologies with mixed specific applicability, e.g. for both general and peer-to-peer distributed systems. In this paper we aim to fill these gaps by presenting a comprehensive pattern-driven security methodology – arrived at by applying a previously devised approach to engineering security methodologies – specifically designed for general distributed systems, which is also capable of taking into account the specifics of peer-to-peer systems as needed. Our methodology takes the principle of encapsulation several steps further, by employing patterns not only for the incorporation of security features (via security solution frames), but also for the modeling of threats, and even as part of its process. We illustrate and evaluate the presented methodology in detail via a realistic example – the development of a distributed system for file sharing and collaborative editing. In both the presentation of the methodology and example our focus is on the early life-cycle phases (analysis and design). •Incorporating security features when designing distributed systems is a challenge.•We propose ASE, a unique pattern-driven security methodology for this purpose.•We describe ASE in detail, emphasizing the analysis and design life-cycle phases.•We illustrate and evaluate ASE by designing a realistic distributed software system.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:0920-5489
1872-7018
DOI:10.1016/j.csi.2015.02.011