Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Introducing security building block models

: Rein, A.; Rudolph, C.; Ruiz, J.F.; Arjona, M.


Institute of Electrical and Electronics Engineers -IEEE-; IEEE Computer Society:
ASE International Conference on BioMedical Computing, BioMedCom 2012. Proceedings : 14-16 December, 2012, Washington, DC, USA
Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2013
ISBN: 978-1-4673-5495-0 (Print)
ISBN: 978-0-7695-4938-5
International Conference on BioMedical Computing (BioMedCom) <2012, Washington/DC>
Workshop on Redefining and Integrating Security Engineering (RISE) <2012, Washington/DC>
Conference Paper
Fraunhofer SIT ()

In today's software development process, security related design decisions are rarely made early in the overall process. Even if security is considered early, this means that in most cases a more-or-less encompassing security requirement analyses is made, Based on this analysis best-practices, ad-hocdesign decisions or individual expertise is used to integrate security during the development process or after weaknesses are found after the deployment. This paper introduces Security Building Block Models which are used to build security related components, namely Security Building Blocks. These Security Building Blocks represent concrete security solutions, so called Security Properties, introduced in other publications of the Sec Futur project. The goal of this approach is to provide already defined and tested security related software components, which can be used early in the overall development process, to support security-design-decision already while modeling the software-system. The paper shortly describes this new Security Engineering Process with its requirement analysis and definition of Security Properties and how the Security Building Block Model fits into this approach. Additionally the Security Building Block Model is presented in detail. All artifacts and relationships of the model are described. Short examples finish up the paper to show the creation of the Security Building Blocks and their interactions with other software components.