information regarding the way several key actors in
the software development process view and judge
those requirements.
4 CONCLUSION
This paper introduces some elements in
improvement of representation security components
with integration of software components by using
security patterns and creating the security patterns
repository. It was shown that this approach may be
used to development of expert systems in security
domain.
It was shown the improved security ontology
with taking into account the elements of fuzzy
expert system.
The security patterns repository and security
patterns approach provides opportunity to software
engineers, who are not security experts, to make the
appropriate choices regarding security mechanisms
and solutions, thus facilitating the development of
secure applications. As a next step, this repository
will be employed in the development of a security
domain application, such as development of expert
systems for information security active audit.
REFERENCES
Akerman, A. and Tyree, J. 2006. Using ontology to
support development of software architectures. IBM
Sys. Journal, vol. 45, N0 4, pp. 813-825.
Atymtayeva L., Kozhakhmet K., Bortsova G., Inoue A.
2012. Expert System for Security Audit Using Fuzzy
Logic. Proc of MAICS, April 21-22, 2012, Cincinnati,
USA, рр. 146-151
Atymtayeva L., K. Kozhakhmet, G. Bortsova, 2014,
Building a Knowledge Base for Expert System in
Information Security. Soft Computing in Artificial
Intelligence Advances in Intelligent Systems and
Computing Volume 270, pp 57-76
Balopoulos Th. , et.al., 2006. A Framework for Exploiting
Security Expertise in Application Development. In
Lecture Notes in Computer Science, Volume 4083, pp
62-70
Basin, D.A., Doser, J., and Lodderstedt, T. 2006. Model
driven security: From UML models to access control
infrastructures. ACM Trans. on Software Engineering
and Methodology, vol. 15, No 1,pp. 39-49
Biham, E. Boyer M., Boykin P. O., Mor T., and
Roychowdhury V. 2000. A Proof of the Security of
Quantum Key Distribution. Procs of the 32’nd Ann.
ACM Symposium STOC’00, ACM Press, pp. 715-724.
Braz, F., Fernandez, E.B.,and VanHilst, M. 2008. Eliciting
security requirements through misuse activities. Procs.
of the 2nd Int. Workshop SPattern'07, Turin, Italy,
September 1-5, 2008, pp.328-333.
Buschmann, F., et al. 1996. Pattern- oriented software
architecture, Wiley.
Dritsas,S., Gymnopoulos, L., Karyda, M., Balopoulos, T.,
Kokolakis, S., Lambridounakis, C., and Gritzalis, S.
2005. Employing ontologies for the development of
security critical applications. Procs, of the IFIP I3E
Conf., Oct. 2005, pp.187-201.
Fenz S. and Ekelhart A. 2009. Formalizing information
security knowledge, ASIACCS ’09, ACM.
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., and
VanHilst, M., 2006. A methodology to develop secure
systems using patterns, Chapter 5 in "Integrating
security and software engineering: Advances and
future vision", H. Mouratidis and P. Giorgini (Eds.),
IDEA Press, pp. 107-126.
Fernandez, E.B. and X.Yuan. 2010. Semantic analysis
patterns and secure semantic analysis patterns", in
revision for the IJICS, Inderscience Publishers.
Gamma E., 2001. Design patterns ten years later. In Broy,
M., Denert, E., eds.: Software Pioneers: Contributions
to Software Engineering, Springer-Verlag. pp. 689–
699.
Lazaros Gymnopoulos1, et.al., 2006 Developing a
Security Patterns Repository for Secure Applications
Design
Lipner, S. and Howard, M. 2005. The Trustworthy
Computing Security Development Lifecycle, MSDN
Library
Maljuk A.A. 2010. Information Security: Contemporary
Issues, Security Information technology; № 1, pp.5-9.
Mouratidis H., and Giorgini, P. 2004 Analysing security in
information systems. Procs. of the 2nd Int. Workshop
ICEIS 2004, Porto, Portugal.
Nagaratnam, N., Nadalin, A., Hondo, M., McIntosh, M.,
and Austel, P. 2005. Business-driven application
security: from modeling to managing secure
applications. IBM Systems Journal, vol. 44, No 4,
pp.847-867
Protsenko N., Atymtayeva L., Kozhakhmet K. 2012.
Using FRIL in Development of Expert System
Applications, Proc. ICITM 2012, Riga, Latvia, p. 98.
Shor P. W. 1994 Algorithms for quantum computation:
Discrete logarithms and factoring. In Procs of the
35nd Annual Symposium on FCS IEEE CSP. pp. 124–
134.
Schumacher M., Fernandez E.B., et.al., 2006. Security
Patterns: Integrating Security And Systems
Engineering, John Wiley&Sons Inc.
Taylor, R.N., Medvidovic, N., and Dashofy, N. 2010.
Software architecture: Foundation, theory, and
practice, Wiley.
Voroviev, A. and Bekmamedova, N. 2010. An ontology-
driven approach applied to information security. J. of
Research and Practice in Information Tech., vol. 42,
No 1, pp.61-76.
Fifth International Symposium on Business Modeling and Software Design
204