A Methodology to Develop Secure Systems Using Patterns

Author(s):  
E. B. Fernandez ◽  
M. M. Larrondo-Petrie ◽  
T. Sorgente ◽  
M. Vanhilst

We are developing a methodology to build secure software for complex applications and its related support. This methodology considers the whole software lifecycle, uses security patterns, and is applied at all the architectural levels of the system. A main idea is that security principles should be applied at every stage and that each stage can be tested for compliance with security principles. Patterns help apply security principles. This chapter presents the current status of our work.

Author(s):  
E. B. Fernandez ◽  
M. M. Larrondo-Petrie

We are developing a methodology to build secure software for complex applications and its related support. This methodology considers the whole software lifecycle, uses security patterns, and is applied at all the architectural levels of the system. A main idea is that security principles should be applied at every stage and that each stage can be tested for compliance with security principles. Patterns help apply security principles. This chapter presents the current status of our work.


Author(s):  
Hironori Washizaki ◽  
Tian Xia ◽  
Natsumi Kamata ◽  
Yoshiaki Fukazawa ◽  
Hideyuki Kanuka ◽  
...  

Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.


Author(s):  
Aderemi O. Adeniji ◽  
Seok-Won Lee

Software Assurance is the planned and systematic set of activities that ensures software processes and products conform to requirements while standards and procedures in a manner that builds trusted systems and secure software. While absolute security may not yet be possible, procedures and practices exist to promote assurance in the software lifecycle. In this paper, the authors present a framework and step-wise approach towards achieving and optimizing assurance by infusing security knowledge, techniques, and methodologies into each phase of the Software Development Lifecycle (SDLC).


Author(s):  
Kenichi Suzuki ◽  
Y. Namita ◽  
H. Abe ◽  
I. Ichihashi ◽  
Kohei Suzuki ◽  
...  

In 1998FY, the 6 year program of piping tests was initiated with the following objectives: i) to clarify the elasto-plastic response and ultimate strength of nuclear piping, ii) to ascertain the seismic safety margin of the current seismic design code for piping, and iii) to assess new allowable stress rules. In order to resolve extensive technical issues before proceeding on to the seismic proving test of a large-scale piping system, a series of preliminary tests of materials, piping components and simplified piping systems is intended. In this paper, the current status of the piping component tests and the simplified piping system tests is reported with focus on fatigue damage evaluation under large seismic loading.


2013 ◽  
Vol 477-478 ◽  
pp. 878-882
Author(s):  
Hai Peng Guo ◽  
Li Ya Wang ◽  
Shan Shan Fan

Groundwater plays an important role and accounts for two-thirds of the total water supply in Beijing plain. Overexploitation of groundwater has caused continuous decline in groundwater levels, land subsidence and other environmental and ecological problems. To analyze current status and predict future trends in groundwater resources, a 3D transient groundwater flow model was established and used to simulate various groundwater resources development schemes. With considering some facters such as groundwater exploitation, river outflow, groundwater levels and so on, an evaluation index system was constructed. Based on this index system a multi-object decision model was established for estimation of groundwater development schemes and proven to be very useful for scientific analysis of reasonable development and utilization of groundwater resources.


2010 ◽  
Vol 1 (4) ◽  
pp. 35-61 ◽  
Author(s):  
J. J. Simpson ◽  
M. J. Simpson ◽  
B. Endicott-Popovsky ◽  
V. Popovsky

This article establishes a context for secure information systems development as well as a set of models used to develop and apply a secure software production pedagogy. A generic system model is presented to support the system context development, and to provide a framework for discussing security relationships that exist between and among information systems and their applications. An asset protection model is tailored to provide a conceptual ontology for secure information system topics, and a stable logical framework that is independent of specific organizations, technologies, and their associated changes. This asset protection model provides a unique focus for each of the three primary professional communities associated with the development and operation of secure information systems. In this paper, a secure adaptive response model is discussed to provide an analytical tool to assess risk associated with the development and deployment of secure information systems, and to use as a security metric. A pedagogical model for information assurance curriculum development is then established in the context and terms of the developed secure information system models. The relevance of secure coding techniques to the production of secure systems, architectures, and organizational operations is also discussed.


Author(s):  
J. J. Simpson ◽  
M. J. Simpson ◽  
B. Endicott-Popovsky ◽  
V. Popovsky

This article establishes a context for secure information systems development as well as a set of models used to develop and apply a secure software production pedagogy. A generic system model is presented to support the system context development, and to provide a framework for discussing security relationships that exist between and among information systems and their applications. An asset protection model is tailored to provide a conceptual ontology for secure information system topics, and a stable logical framework that is independent of specific organizations, technologies, and their associated changes. This asset protection model provides a unique focus for each of the three primary professional communities associated with the development and operation of secure information systems. In this paper, a secure adaptive response model is discussed to provide an analytical tool to assess risk associated with the development and deployment of secure information systems, and to use as a security metric. A pedagogical model for information assurance curriculum development is then established in the context and terms of the developed secure information system models. The relevance of secure coding techniques to the production of secure systems, architectures, and organizational operations is also discussed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rajesh Pansare ◽  
Gunjan Yadav ◽  
Madhukar R. Nagare

PurposeThe purpose of this paper is to conduct a systematic bibliometric analysis of reconfigurable manufacturing system (RMS) articles using VOSviewer to identify their research themes and future research trends and investigate their interconnectivity. This paper also aims to identify prominent authors, publishers, organizations, countries and their collaborations in the RMS domain.Design/methodology/approachIn this study, the Scopus database is used to retrieve 454 RMS articles published between 1988 and 2020. These articles are then investigated using VOSviewer to determine their interconnectedness, clusters and citations, as well as to generate a map based on text data. The network visualization diagrams and clusters obtained for documents, authors, sources, organizations and countries are explored to determine the current state and future trends in RMS research.FindingsA bibliometric analysis of selected articles is performed, and current research hotspots in this domain are identified. This work also investigates the current status and future research trends in this domain. The work presented also identifies top researchers, journals, countries and documents in RMS.Practical implicationsThis paper can provide academics, researchers and practitioners with additional research insights. At the same time, the research trends identified here can help to direct research and benefit researchers.Originality/valueThe study is the first attempt to review selected documents in the RMS domain using bibliometric analysis tools, and it presents a method for collecting articles, organizing them and analyzing the data.


1992 ◽  
Vol 114 (1) ◽  
pp. 62-69 ◽  
Author(s):  
A. H. P. Swift ◽  
Peter Golding

Since 1986, the 3355 m2 salt gradient solar pond facility in El Paso, Texas, has operated with a temperature difference between the upper and lower zones of 55 to 75° C while delivering industrial process heat, grid-connected electrical power, and thermal energy for the experimental production of desalted water. Because the El Paso solar pond is an inland facility, it is necessary to recycle the salt in a sustainable salt management system. A method that uses the main pond surface for initial brine concentration and short-term storage was developed after it became evident that the original evaporation pond system was undersized. This paper examines the method for brine concentration and storage, the effects of a brine storage zone on pond operation, and the installation of an enhanced evaporation net system and an automatic scanning injection system. A short description of the performance history and current status of the project is also included.


Sign in / Sign up

Export Citation Format

Share Document