Improving software security through an integrated approach

Zaobin Gan*, Dengwei Wei, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

It has been recognized that the main source of problems with application software security is in most cases that the software is poorly designed and developed with respect to authentication and authorization. Aiming at preventing the security issues in the course of software design and development, this paper presents a framework for integrating a security policy specification with a system function integration. On the basis of the Role-Based Access Control (RBAC) model, this framework moves the responsibility of security through a central authorization management mechanism, Single Sign-On (SSO) access and integration management of security resources. The design can integrate the enterprise's multiple new, developing and existing application systems, and provide end users access these systems as a single system. An application instance of the framework is given in a large-sized enterprise information integrated system as well. The results show that the framework may provide enterprises with uniform and robust enforcement policies to improve the security of sensitive information systems.

Original languageEnglish
Title of host publicationSECRYPT 2006 - International Conference on Security and Cryptography, Proceedings
EditorsJoaquim Filipe
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages437-442
Number of pages6
ISBN (Print)9728865635, 9789728865634
Publication statusPublished - 2006
EventInternational Conference on Security and Cryptography, SECRYPT 2006 - Setubal, Portugal
Duration: 7 Aug 200610 Aug 2006

Other

OtherInternational Conference on Security and Cryptography, SECRYPT 2006
Country/TerritoryPortugal
CitySetubal
Period7/08/0610/08/06

Keywords

  • RBAC
  • System integration

Fingerprint

Dive into the research topics of 'Improving software security through an integrated approach'. Together they form a unique fingerprint.

Cite this