were designed with zero or more security patterns
required by application components, one or more
communication patterns to realize message
communication between the components, and
security coordinators to integrate security and
communication patterns. The secure software
architectural patterns were designed using a
component-based model depicting the component’s
ports, interfaces, and connectors. Secure connectors
make the secure software architectural patterns more
maintainable and evolvable. We also implemented a
distributed baseball game application using the secure
MVC software architectural pattern designed with
secure connectors to validate our approach.
We envision future work to extend this research.
We can extend our approach to other secure software
architectural patterns. The secure connectors
designed for secure software architectural patterns
could also be further validated using model checkers
to check correctness, deadlock, and security
properties. Our validation would thus become more
concrete with model checking. In addition, we could
investigate the secure connectors adaptable to
changing communication patterns and security
patterns at runtime. Moreover, we could extend this
research to designing secure connectors that recover
the failures to communication or security.
REFERENCES
Al-Azzani, S. and Bahsoon, R., 2012, August. SecArch:
Architecture-level evaluation and testing for security.
In Software Architecture (WICSA) and European
Conference on Software Architecture (ECSA), 2012
Joint Working IEEE/IFIP Conference on (pp. 51-60).
Albassam, E., Gomaa, H. and Menascé, D.A., 2016, July.
Model-based Recovery Connectors for Self-adaptation
and Self-healing. In ICSOFT-EA (pp. 79-90).
Basin, D., Clavel, M. and Egea, M., 2011, June. A decade
of model-driven security. In Proceedings of the 16th
ACM symposium on Access control models and
technologies (pp. 1-10). ACM.
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P.,
1996. Pattern Oriented Software Architecture: A
System of Patterns, John Wiley & Sons.
Fernandez-Buglioni, E., 2013. Security patterns in practice:
designing secure architectures using software patterns.
John Wiley & Sons.
Gomaa, H., Menascé, D.A. & Shin, M.E., 2001. Reusable
component interconnection patterns for distributed
software architectures. Proceedings of the 2001
symposium on Software reusability putting software
reuse in context - SSR 01.
Gomaa, H., Hashimoto, K., Kim, M., Malek, S., and
Menascé, D.A., 2010, March. Software adaptation
patterns for service-oriented architectures. In
Proceedings of the 2010 ACM Symposium on Applied
Computing (pp. 462-469). ACM.
Gomaa, H., 2011. Software modeling and design: UML,
use cases, patterns, and software architectures.
Cambridge University Press.
Ren, J., Taylor, R., Dourish, P. and Redmiles, D., 2005,
May. Towards an architectural treatment of software
security: a connector-centric approach. In ACM
SIGSOFT Software Engineering Notes (Vol. 30, No. 4,
pp. 1-7). ACM.
Rumbaugh, J., Booch, G., and Jacobson, I., 2004. The
Unified Modeling Language Reference Manual,
Addison-Wesley.
Schumacher, M., Fernandez, E.B., Hybertson, D.,
Buschmann, F. and Sommerlad, P., 2006. Security
Patterns, Wiley.
Shaw, M., and Garlan, D., 1996. Software Architecture:
Perspectives on an Emerging Discipline, Pearson.
Shin, M.E., Malhotra, B., Gomaa, H. and Kang, T., 2012,
July. Connectors for Secure Software Architectures. In
SEKE (pp. 394-399).
Shin, M.E., Gomaa, H., Pathirage, D., Baker, C. and
Malhotra, B., 2016. Design of Secure Software
Architectures with Secure Connectors. International
Journal of Software Engineering and Knowledge
Engineering, 26(05), pp.769-805.
Shin, M., Gomaa, H. and Pathirage, D., 2016, June.
Reusable Secure Connectors for Secure Software
Architecture. In International Conference on Software
Reuse (pp. 181-196). Springer, Cham.
Shin, M., Gomaa, H. and Pathirage, D., 2017. Model-based
Design of Reusable Secure Connectors. In 4th
International Workshop on Interplay of Model-Driven
and Component-Based Software Engineering
(ModComp) 2017 Workshop Pre-proceedings (p. 6).
Shin, M., H. Gomaa, and D. Pathirage, 2018, July. A
Software Production Line Approach for Feature
Modeling and Design of Secure Connectors. In 14
th
International Conference on Software Technologies
(ICSOFT2018), Porto, Portugal (Best paper award).
Shin, E. M., H. Gomaa, D. Pathirage, 2019, August. A
Software Product Line Approach to Design Secure
Connectors in Component-Based Software
Architectures. In Communications in Computer and
Information Science, Springer, Communications in
Computer and Information Science book series (CCIS,
Volume 1077).
Shin, M., Kang, T., and Gomaa, H., 2021. Design of Secure
Connectors for Complex Message Communications in
Software Architecture, 2nd European Symposium on
Software Engineering, Nov. 19-21, Larissa, Greece.
Taylor, R. N., Medvidovic, N., and Dashofy, E., 2010,
Software architecture: foundations, theory, and
practice. Wiley.
Van den Berghe, A., Scandariato, R., Yskout, K. et al.,
2017. Design notations for secure software: a
systematic literature review, Software & Systems
Modeling 16, 809–831.