TY - GEN
T1 - A pattern based approach for secure database design
AU - Abramov, Jenny
AU - Sturm, Arnon
AU - Shoval, Peretz
PY - 2011/1/1
Y1 - 2011/1/1
N2 - Security in general and database protection from unauthorized access in particular, are crucial for organizations. Although it has long been accepted that system requirements should be considered from the early stages of the development, non-functional requirements, such security, tend to be neglected or dealt-with only at the end of the development process. Various methods have been proposed, however, none of them provide a complete framework to guide, enforce and verify the correct implementation of security policies within a system design, and generate source code from it. In this paper, we present a novel approach that guides database designers, to design a database schema that complies with the organizational security policies related to authorization. First, organizational policies are defined in the form of security patterns. Then, during the application development, the patterns guide the implementation of the security requirements and the correct application of the patterns is verified. Finally, the secure database schema is automatically generated.
AB - Security in general and database protection from unauthorized access in particular, are crucial for organizations. Although it has long been accepted that system requirements should be considered from the early stages of the development, non-functional requirements, such security, tend to be neglected or dealt-with only at the end of the development process. Various methods have been proposed, however, none of them provide a complete framework to guide, enforce and verify the correct implementation of security policies within a system design, and generate source code from it. In this paper, we present a novel approach that guides database designers, to design a database schema that complies with the organizational security policies related to authorization. First, organizational policies are defined in the form of security patterns. Then, during the application development, the patterns guide the implementation of the security requirements and the correct application of the patterns is verified. Finally, the secure database schema is automatically generated.
KW - Secure software engineering
KW - authorization
KW - database design
UR - http://www.scopus.com/inward/record.url?scp=79960333132&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-22056-2_65
DO - 10.1007/978-3-642-22056-2_65
M3 - Conference contribution
AN - SCOPUS:79960333132
SN - 9783642220555
T3 - Lecture Notes in Business Information Processing
SP - 637
EP - 651
BT - Advanced Information Systems Engineering Workshops - CAiSE 2011 International Workshops, Proceedings
PB - Springer Verlag
ER -