Abstract
Security has become a paramount concern due to dramatic advances of network technologies and a wide variety of new business opportunities. These advances have also brought the need for integration of computers systems to the surface, mainly for real-time, information sharing. As these systems are network-based, COTS products are predominantly used in these types of integration efforts. Since security is still a relatively new concern, it is often addressed as an afterthought in software development. Unfortunately, to ensure a high degree of security, it is imperative to address the concerns in a principled manner. Software architectures provide a unique opportunity to assess and structure the security as part of integration solution design. In this paper, we describe an approach to constructing secure integration architectures—architectural solutions to component interoperability that both satisfy known functional security policies and that specify the functionality of security mechanisms used to fulfill them.
This material is based upon work supported in part by AFOSR (F49620-98-1-0217) and NSF (CCR-9988320). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation or the US government. The government has certain rights to this material.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abd-Allah, A.: Composing Heterogeneous Software Architectures. Ph. D. Dissertation, Computer Science, University of Southern California (1996)
Anderson, R.: Security Engineering—A Guide to Building Dependable Distributed Systems. John Wiley &Sons, Inc. (2001)
Davis, L., and Gamble, R.: The Impact of Component Architectures on Interoperability. In: Journal of Systems and Software (2002)
Davis, L., Gamble, R., Payton, J., Jonsdottir, G., and Underwood, D.: A Notation for Problematic Architecture Interactions. In: ESEC/FSE, Vienna, Austria (2001)
Davis, L., Gamble, R., and Underwood, D.: Conflict Patterns: Toward Identifying Suitable Middleware (2000)
Devanbu, P., and Stubblebine, S.: Software Engineering for Security: a Roadmap. In: The Future of Software Engineering, Special Volume published in conjunction with ICSE, Limerick, Ireland (2000)
Garlan, D., Allen, A., and Ockerbloom, J.: Architectural Mismatch, or Why it is Hard to Build Systems out of Existing Parts. In: ICSE, Seattle, WA (1995)
Han, J., and Zheng, Y.: Security Characterisation and Integrity Assurance for Component-based Software. In: International Conference on Software Methods and Tools, IEEE Computer Society Press, Wollongong, Australia (2000)
Jonsdottir, G.: Notating Problematic Architecture Interactions. M.S. Thesis, Department of Mathematical and Computer Sciences, The University of Tulsa (2002)
Jónsdóttir, G., Flagg, D., Davis, L., and Gamble, R.: Integrating Components Incrementally for Composite Application Development. SEAT-UTULSA-2001-19, Department of Mathematical and Computer Sciences, The University of Tulsa (2001)
Kazman, R., Klein, M., and Clements, P.: ATAM: Method for Architecture Evaluation (2000)
Keshav, R.: Architecture Integration Elements: Connectors that Form Middleware. M.S. Thesis, Department of Mathematical and Computer Sciences, University of Tulsa (1999)
Keshav, R., and Gamble, R.: Towards a Taxonomy of Architecture Integration Strategies. In: 3rd International Software Architecture Workshop (1998)
Lindqvist, U., and Jonsson, E.: A map of Security Risks Associated with Using COTS. In: IEEE Computer 31(6), (1998) 60–66
Mularz, D.: Pattern-based Integration Architectures. In: PLoP (1994)
Payton, J., Jónsdóttir, G., Flagg, D., and Gamble, R.F.: Merging Integration Solutions for Architecture and Security Mismatch. In: International Conference on COTS-Based Software Systems, Springer-Verlag, Orlando, Florida (2002)
Perry, D., and Wolf, A.: Foundations for the Study of Software Architecture. In: ACM SIGSOFT 17(4) (1992) 40–52
Pfleeger, C.: Security in Computing. NJ: Prentice-Hall Inc., Upper Saddle River (1997)
Rosa, N., Justo, G., and Cunha, P.: A Framework for Building Non-Functional Architectures. In: 16th ACM Symposium on Applied Computing, Las Vegas (2001)
Sellers, C., Gamble, R., Jónsdóttir, G., Flagg, D., and Davis, L.: Middleware Properties: Essential Pieces to the Component Integration Puzzle. SEAT-UTULSA-2001-18, Department of Mathematical and Computer Sciences, The University of Tulsa (2001)
Shaurette, K.: Enterprise Security Management (2001) Available at: http://www.softmart.com/connected/Spring2001/enterprise.htm.
Shaw, M., and Garlan, D.: Software Architecture: Perspectives on an Emerging Discipline. NJ: Prentice Hall, Englewood Cliffs (1996)
Spitznagel, B., and Garlan, D.: A Compositional Approach for Constructing Connectors. In: The Working IEEE/IFIP Conference on Software Architecture, Amsterdam, The Netherlands (2001)
Wheeler, A., and Wheeler, L.: Security Taxonomy &Glossary (2001) Available at: http://www.garlic.com/~lynn/secgloss.htm.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jonsdottir, G., Davis, L., Gamble, R. (2003). Designing Secure Integration Architectures. In: Erdogmus, H., Weng, T. (eds) COTS-Based Software Systems. ICCBSS 2003. Lecture Notes in Computer Science, vol 2580. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36465-X_11
Download citation
DOI: https://doi.org/10.1007/3-540-36465-X_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00562-9
Online ISBN: 978-3-540-36465-8
eBook Packages: Springer Book Archive