A classification methodology for security patterns to help fix software weaknesses - Université Clermont Auvergne Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

A classification methodology for security patterns to help fix software weaknesses

Résumé

Security patterns are generic solutions that can be applied since early stages of software life to overcome recurrent security weaknesses. Their generic nature and growing number make their choice difficult, even for experts in system design. To help them on the pattern choice, this paper proposes a semi-automatic methodology of classification and the classification itself, which exposes relationships among software weaknesses, security principles and security patterns. It expresses which patterns remove a given weakness with respect to the security principles that have to be addressed to fix the weakness. The methodology is based on seven steps, which anatomize patterns and weaknesses into set of more precise sub-properties that are associated through a hierarchical organization of security principles. These steps provide the detailed justifications of the resulting classification and allow its upgrade. Without loss of generality, this classification has been established for Web applications and covers 185 software weaknesses, 26 security patterns and 66 security principles.
Fichier principal
Vignette du fichier
RSB16b.pdf (656.01 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02019271 , version 1 (14-02-2019)

Identifiants

  • HAL Id : hal-02019271 , version 1

Citer

Loukmen Regainia, Sébastien Salva, Cédric Bouhours. A classification methodology for security patterns to help fix software weaknesses. 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Dec 2016, Agadir, Morocco. ⟨hal-02019271⟩
123 Consultations
380 Téléchargements

Partager

Gmail Facebook X LinkedIn More