Vulnerability Database) (OSF, 2015) to determine
threats related to security requirements mentioned on
our abuse case diagram.
To carry out the intention “Mitigate Domain
Security Risks” we choose DREAD method (Meier et
al., 2003) to evaluate risks.
Finally, to perform “Design domain” intention, we
modeled our reference architecture.
6 CONCLUSIONS
The principle aim of this work is to propose
guidelines for developers using Secure SOPL
(Achour et al., 2015). We are based on Map
formalism which permits to orient the developer for
using security methods, concepts, standards and
frameworks (such as RMF, STRIDE and Common
Criteria) all well suited for given situations and
contexts. This work aims to ensure the development
of a product (based on SOA) by taking advantages of
three concepts contributions: a large-scale reuse
system (product line engineering), service-oriented
architecture and software security. We presented an
illustrative example related to a range of
governmental services offered by the Tunisian
Ministry of the interior and local development to
show the feasibility of our proposal. Our perspectives
are first to provide a tool which supports Secure
SOPL. Second, we would like to validate the
proposed approach in different contexts such as e-
commerce, e-learning, etc.
REFERENCES
Achour, I., Labed, L., Ben Ghezala, H., 2014. Toward an
Extended Tool for Analysis of Extended Feature
Models, In: the International Symposium on Network,
Computer and Communications ISNCC'14.
Hammamet, Tunisia.
Achour, I., Labed, L., Ben Ghezala, H., 2015. Proposition
of Secure Service Oriented Product Line, In: the 6th
International Conference on Information Systems and
Economic IntelligenceSIIE'15. Hammamet, Tunisia.
Benavides, D., Trinidad, P., Ruiz-cortés, A., 2005.
Automated Reasoning on Feature Models. LNCS,
Advanced Information Systems Engineering. In: 17th
International Conference, CAISE.
Berger, T., Gunther, S., 2008. Service-Oriented Product
Lines: Towards a Development Process and Feature
Management Model for Web Services, In: 12th
International Software Product Line Conference
(SPLC 2008), Limerick, Ireland.
Common Criteria for Information Technology Security
Evaluation Norm ISO 15408 – Part 1: Introduction and
general model – version 3.1 2009.
Common Criteria for Information Technology Security
Evaluation Norm ISO 15408 – Part 2: Security
functional requirements– version 3.1, 2009.
Common Criteria for Information Technology Security
Evaluation Norm ISO 15408 – Part 3: Security
assurance requirements– version 3.1, 2009.
De Win, B., Scandariato, R., Buyens, K., Grégoire, J.,
Joosen, W., 2009. On the secure software development
process: CLASP, SDL and Touchpoints compared.
Information and Software Technology, Vol. 51, No. 7,
pp. 1152-1171.
Essafi, M., 2014. Approche multi-démarches avec guidage
flexible pour le développement de logiciels sécurisés,
Thesis, Manouba University.
Essafi, M., Labed L., Ben Ghezala, H., 2007. S2D-ProM:
A Strategy Oriented Process Model for Secure
Software Development, In : the second International
Conference on Software Engineering Advances (ICSEA
2007), Cap Esterel, French Riviera, France.
Finkelstein, A., Kramer, J., Nuseibeh, B., 1994. Software
Process Modelling and Technology, Advanced
Software Development Series, Research Studies
Press/John Wiley &Sons..
Howard, M., 2008. Microsoft Corporation: Fundamental
practices for secure software development, Stacy
Simpson, SAFECode.
Kang, K., Cohen, S., Hess, J., Novak, W., Peterson, S.,
1990. Feature-Oriented Domain Analysis (FODA)
Feasibility Study. Technical report CMU/SEI-90-TR-
21, Software Engineering Institute, Carnegie Mellon
University, Pittsburgh.
Krakowiak, S., Coupaye, T., Quema, V., Seinturier, L.,
Stefani, J., 2007. Intergiciel et Construction
d’Applications Réparties.
Lipner, S., 2004. The Trustworthy Computing Security
Development Lifecycle, Computer Security
Applications Conference, 20th Annual Publication,
ISSN: 1063-9527, ISBN: 0-7695-2252-1, pages 2-13.
McDermott, J., Fox, C., 1999. Using Abuse Case Models
for Security Requirements Analysis, In: 15th Annual
Computer Security Applications Conference, Phoenix,
Arizona.
McGraw, G., 2004. Software Security: Building Security,
In. IEEE Computer Society, IEEE Security and
Privacy.
Mead, N. R., Hough, E. D., Stehney, T. R., 2005. Security
Quality Requirements Engineering (SQUARE)
Methodology, Technical report CMU/SEI-2005-TR-
009, Carnegie Mellon University.
Medeiros, F., Romero, S., Santana, E., 2009. Towards an
Approach for Service-Oriented Product Line
Architectures. In: 13th International Software Product
Line Conference (SPLC 2009), San Fransisco, CA,
USA.
Meier, J. D., Mackman, A., Vasireddy, S., Dunner, M.,
Escamilla, R., Murukan, A., 2003. Improving Web
Application Security: Threats and Countermeasures.
Microsoft Corporation.
FormalizationofSecureServiceOrientedProductLine
99