Skip to main content

Designing Secure Integration Architectures

  • Conference paper
  • First Online:
COTS-Based Software Systems (ICCBSS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2580))

Included in the following conference series:

  • 345 Accesses

Abstract

Security has become a paramount concern due to dramatic advances of network technologies and a wide variety of new business opportunities. These advances have also brought the need for integration of computers systems to the surface, mainly for real-time, information sharing. As these systems are network-based, COTS products are predominantly used in these types of integration efforts. Since security is still a relatively new concern, it is often addressed as an afterthought in software development. Unfortunately, to ensure a high degree of security, it is imperative to address the concerns in a principled manner. Software architectures provide a unique opportunity to assess and structure the security as part of integration solution design. In this paper, we describe an approach to constructing secure integration architectures—architectural solutions to component interoperability that both satisfy known functional security policies and that specify the functionality of security mechanisms used to fulfill them.

This material is based upon work supported in part by AFOSR (F49620-98-1-0217) and NSF (CCR-9988320). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation or the US government. The government has certain rights to this material.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abd-Allah, A.: Composing Heterogeneous Software Architectures. Ph. D. Dissertation, Computer Science, University of Southern California (1996)

    Google Scholar 

  2. Anderson, R.: Security Engineering—A Guide to Building Dependable Distributed Systems. John Wiley &Sons, Inc. (2001)

    Google Scholar 

  3. Davis, L., and Gamble, R.: The Impact of Component Architectures on Interoperability. In: Journal of Systems and Software (2002)

    Google Scholar 

  4. Davis, L., Gamble, R., Payton, J., Jonsdottir, G., and Underwood, D.: A Notation for Problematic Architecture Interactions. In: ESEC/FSE, Vienna, Austria (2001)

    Google Scholar 

  5. Davis, L., Gamble, R., and Underwood, D.: Conflict Patterns: Toward Identifying Suitable Middleware (2000)

    Google Scholar 

  6. Devanbu, P., and Stubblebine, S.: Software Engineering for Security: a Roadmap. In: The Future of Software Engineering, Special Volume published in conjunction with ICSE, Limerick, Ireland (2000)

    Google Scholar 

  7. Garlan, D., Allen, A., and Ockerbloom, J.: Architectural Mismatch, or Why it is Hard to Build Systems out of Existing Parts. In: ICSE, Seattle, WA (1995)

    Google Scholar 

  8. Han, J., and Zheng, Y.: Security Characterisation and Integrity Assurance for Component-based Software. In: International Conference on Software Methods and Tools, IEEE Computer Society Press, Wollongong, Australia (2000)

    Google Scholar 

  9. Jonsdottir, G.: Notating Problematic Architecture Interactions. M.S. Thesis, Department of Mathematical and Computer Sciences, The University of Tulsa (2002)

    Google Scholar 

  10. JĂłnsdĂłttir, G., Flagg, D., Davis, L., and Gamble, R.: Integrating Components Incrementally for Composite Application Development. SEAT-UTULSA-2001-19, Department of Mathematical and Computer Sciences, The University of Tulsa (2001)

    Google Scholar 

  11. Kazman, R., Klein, M., and Clements, P.: ATAM: Method for Architecture Evaluation (2000)

    Google Scholar 

  12. Keshav, R.: Architecture Integration Elements: Connectors that Form Middleware. M.S. Thesis, Department of Mathematical and Computer Sciences, University of Tulsa (1999)

    Google Scholar 

  13. Keshav, R., and Gamble, R.: Towards a Taxonomy of Architecture Integration Strategies. In: 3rd International Software Architecture Workshop (1998)

    Google Scholar 

  14. Lindqvist, U., and Jonsson, E.: A map of Security Risks Associated with Using COTS. In: IEEE Computer 31(6), (1998) 60–66

    Google Scholar 

  15. Mularz, D.: Pattern-based Integration Architectures. In: PLoP (1994)

    Google Scholar 

  16. Payton, J., JĂłnsdĂłttir, G., Flagg, D., and Gamble, R.F.: Merging Integration Solutions for Architecture and Security Mismatch. In: International Conference on COTS-Based Software Systems, Springer-Verlag, Orlando, Florida (2002)

    Google Scholar 

  17. Perry, D., and Wolf, A.: Foundations for the Study of Software Architecture. In: ACM SIGSOFT 17(4) (1992) 40–52

    Article  Google Scholar 

  18. Pfleeger, C.: Security in Computing. NJ: Prentice-Hall Inc., Upper Saddle River (1997)

    Google Scholar 

  19. Rosa, N., Justo, G., and Cunha, P.: A Framework for Building Non-Functional Architectures. In: 16th ACM Symposium on Applied Computing, Las Vegas (2001)

    Google Scholar 

  20. Sellers, C., Gamble, R., JĂłnsdĂłttir, G., Flagg, D., and Davis, L.: Middleware Properties: Essential Pieces to the Component Integration Puzzle. SEAT-UTULSA-2001-18, Department of Mathematical and Computer Sciences, The University of Tulsa (2001)

    Google Scholar 

  21. Shaurette, K.: Enterprise Security Management (2001) Available at: http://www.softmart.com/connected/Spring2001/enterprise.htm.

  22. Shaw, M., and Garlan, D.: Software Architecture: Perspectives on an Emerging Discipline. NJ: Prentice Hall, Englewood Cliffs (1996)

    MATH  Google Scholar 

  23. Spitznagel, B., and Garlan, D.: A Compositional Approach for Constructing Connectors. In: The Working IEEE/IFIP Conference on Software Architecture, Amsterdam, The Netherlands (2001)

    Google Scholar 

  24. Wheeler, A., and Wheeler, L.: Security Taxonomy &Glossary (2001) Available at: http://www.garlic.com/~lynn/secgloss.htm.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jonsdottir, G., Davis, L., Gamble, R. (2003). Designing Secure Integration Architectures. In: Erdogmus, H., Weng, T. (eds) COTS-Based Software Systems. ICCBSS 2003. Lecture Notes in Computer Science, vol 2580. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36465-X_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-36465-X_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00562-9

  • Online ISBN: 978-3-540-36465-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics