Reference Hub1
Developing Secure Software Using UML Patterns

Developing Secure Software Using UML Patterns

Holger Schmidt, Denis Hatebur, Maritta Heisel
ISBN13: 9781466663596|ISBN10: 1466663596|EISBN13: 9781466663602
DOI: 10.4018/978-1-4666-6359-6.ch002
Cite Chapter Cite Chapter

MLA

Schmidt, Holger, et al. "Developing Secure Software Using UML Patterns." Handbook of Research on Innovations in Systems and Software Engineering, edited by Vicente García Díaz, et al., IGI Global, 2015, pp. 32-70. https://doi.org/10.4018/978-1-4666-6359-6.ch002

APA

Schmidt, H., Hatebur, D., & Heisel, M. (2015). Developing Secure Software Using UML Patterns. In V. Díaz, J. Lovelle, & B. García-Bustelo (Eds.), Handbook of Research on Innovations in Systems and Software Engineering (pp. 32-70). IGI Global. https://doi.org/10.4018/978-1-4666-6359-6.ch002

Chicago

Schmidt, Holger, Denis Hatebur, and Maritta Heisel. "Developing Secure Software Using UML Patterns." In Handbook of Research on Innovations in Systems and Software Engineering, edited by Vicente García Díaz, Juan Manuel Cueva Lovelle, and B. Cristina Pelayo García-Bustelo, 32-70. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6359-6.ch002

Export Reference

Mendeley
Favorite

Abstract

This chapter presents a security engineering process based on UML security problem frames and concretized UML security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. The authors describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Then, solution approaches are specified by generic security components and generic security architectures, which constitute architectural patterns. Finally, the generic security components and the generic security architecture that composes them are refined, and the result is a secure software product built from existing and/or tailor-made security components.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.