Abstract
In today's field of distributed software architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and having various Quality of Service requirements (e.g., timeliness, availability or security). System customization using middleware-services is a promising solution to deal with the coexistence of multiple applications with different Quality of Service requirements. From the security point of view, the goal for system customization is to permit the interoperation among applications having different, possibly inconsistent security constraints. This paper demonstrates how the software architecture paradigm is beneficial for addressing security issues in distributed systems through system customization. The software architecture paradigm. allows the application developer to abstractly specify security-related requirements. Then, our framework takes in charge the system customization to meet these requirements. The practical use of our approach is also addressed by discussing its integration in a configuration-based distributed programming environment.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
R. Allen and D. Garlan. Formalizing architectural connection. In Proceedings of the Sixteenth International Conference on Software Engineering, 1994.
J. P. Banâtre, C. Bryce, and D. LeMétayer. Mechanical Proof of Security Properties. In European Symposium on Research in Computer Security, November 1994.
D. E. Bell. Modeling the Multipolicy Machine. In Proceedings of the New Security Paradigm Workshop, pages 2–9, August 1994.
P.A. Bernstein. Middleware: a Model for Distributed Systems Services. Communication of the ACM, 39(2), February 1996.
C. Bidan and V. Issarny. Dealing with Multi-Policy Security in Large Open Distributed Systems. Submitted for publication, May 1997.
M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital Systems Research Center, February 1989.
M. Chapman and S. Montesi. Overall Concepts and Principles of TINA. Technical Report TB_MDC.018_1.0_94, TINA-C Document, 1995.
R.H. Deng, S.K. Bhonsle, W. Wang, and A.A. Lazar. Integrating Security in CORBA Based Object Architectures. In Proceedings of the IEEE Symposium on Security and Privacy, pages 50–61, May 1995.
Department of Defense Standard. Trusted computer system evaluation criteria. Technical Report DoD 5200.28-STD, December 1985.
F. DeRemer and H. Kron. Programming-in-the-Large versus Programming-in-the-Small. IEEE Transactions on Software Engineering, 2(2):80–86, June 1976.
M. Gasser. Building a secure computer system. Number ISBN 0-442-23022-2. Van Nostrand Reinhold, 1988.
D. Gelernter and N. Carriero. Coordination languages and their significance. Communications of the ACM, 35(2):97–107, 1992.
H.H. Hosmer. Metapolicies II. In Proceedings of the 15th National Computer Security Conference, pages 369–378, 1992.
V. Issarny and C. Bidan. Aster: A Framework for Sound Customization of Distributed Runtime Systems. In Proceedings of the Sixteenth IEEE International Conference on Distributed Computing Systems, 1996.
V. Issarny, C. Bidan, and T. Saridakis. Designing an open-ended distributed file system in Aster. In Proceedings of the 9th International Conference on Parallel and Distributed Computing Systems, 1996.
V. Issarny, C. Bidan, and T. Saridakis. Customizing Middleware to Meet Quality of Service Constraints. Submitted for publication, 1997.
P. Janson and R. Molva. Security in open networks and distributed systems. Computer Networks and ISDN Systems, (22):323–346, 1991.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems, 10(4):265–310, November 1992.
C. E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247–278, November 1981.
J. Magee, N. Dulay, and J. Kramer. A Constructive Development for Parallel and Distributed Programs. In Proceedings of the International Workshop on Configurable Distributed Systems, 1994.
J. McLean. The Algebra of Security. In Proceedings of the 1988 IEEE Computer Society Symposium on Security and Privacy, pages 2–7, April 1988.
National Computer Security Center. Trusted network interpretation of the tcsec. Technical Report NCSC-TG-005, July 1987.
OMG. The Common Object Request Broker: Architecture and Specification — Revision 2.0. Technical report, OMG Document, 1995.
OMG Security Working Group. White Paper on Security. TC Document 94.4.16, OMG, April 1994. Available by ftp at ftp.omg.org:/pub/docs.
D. E. Perry and A. L. Wolf. Foundations for the study of software architecture. ACM SIGSOFT Software Engineering Notes, 17(4):40–52, 1992.
J. M. Purtilo. The Polylith software bus. ACM Transactions on Programming Languages and Systems, 16(1):151–174, 1994.
B. Schneier. Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C, volume ISBN 0-471-11709-9. John Wiley & Sons, Inc., 1993.
M. Shaw, R. DeLine, D. Klein, T. Ross, D. Young, and G. Zelesnik. Abstractions for software architecture and tools to support them. IEEE Transactions on Software Engineering, 21(4):314–335, 1995.
Sun Microsystems Inc. The Java Virtual Machine Specification. Technical report, Sun Document, 1995.
L. van Doorn, M. Abadi, M. Burrows, and E. Wobber. Secure Network Objects. In Proceedings of the IEEE Symposium on Security and Privacy, pages 211–221, May 1996.
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos Operating System. In Proceedings of ACM SIGOPS '93, pages 256–269, 1993.
A. M. Zaremski and J. M. Wing. Specification matching of software components. In Proceedings of the ACM SIGSOFT'95 Foundations of Software Engineering Symposium, 1995.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bidan, C., Issarny, V. (1997). Security benefits from software architecture. In: Garlan, D., Le Métayer, D. (eds) Coordination Languages and Models. COORDINATION 1997. Lecture Notes in Computer Science, vol 1282. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-63383-9_73
Download citation
DOI: https://doi.org/10.1007/3-540-63383-9_73
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63383-9
Online ISBN: 978-3-540-69527-1
eBook Packages: Springer Book Archive