000 02097naa a2200253 a 4500
003 AR-LpUFIB
005 20250311170303.0
008 230201s2009 ag o 000 0 spa d
024 8 _aDIF-M3120
_b3225
_zDIF003031
040 _aAR-LpUFIB
_bspa
_cAR-LpUFIB
100 1 _aSolinas, Miguel
245 1 0 _aEmbedding security patterns into a domain model
300 _aDatos electrónicos (1 archivo: 359 KB)
500 _aFormato de archivo: PDF. -- Este documento es producción intelectual de la Facultad de Informática-UNLP (Colección BIPA / Biblioteca.) -- Disponible también en línea (Cons. 03/05/2011)
520 _aIncorporating security patterns at every stage of software development process is one of the most effective ways to build secure software. But how early in the software development process is it possible to apply security patterns? We present here an approach to define security requirements in order to identify security patterns in the very early stages of the software development process, we also an experience with the method in a limited environment. We use natural language to express requirements (understandable to the Requirements Engineer as well as to the Domain Expert), which it is possible to identify the security requirements the corresponding security patterns. Language Extended Lexicon (LEL) scenarios allow to understand, study, model the security domain to represent security patterns. To them we apply the Baseline Mentor Workbench (BMW) for deriving CRC (Class Responsibility Collaboration) cards that represent the security patterns their contextual model domain. BMW is a tool to assist the domain expert during the requirements engineering stage.
534 _aInternational Workshop on Database Expert Systems Application (20th : 2009 : Linz)
650 4 _aSEGURIDAD Y PROTECCIÓN
650 4 _aTARJETAS CRC
650 4 _aPROGRAMACIÓN ORIENTADA A OBJETOS
700 1 _aAntonelli, Rubén Leandro
700 1 _aFernandez, Eduardo B.
856 4 0 _uwww.computer.org/portal/web/csdl/doi/10.1109/DEXA.2009.44
942 _cCP
999 _c52885
_d52885