Achieving Security Assurance with Assertion-based Application Construction

Journal Title: EAI Endorsed Transactions on Collaborative Computing - Year 2015, Vol 1, Issue 6

Abstract

Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may consequently occur. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.

Authors and Affiliations

Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr

Keywords

Related Articles

An Augmented User Model for Personalized Search in Collaborative Social Tagging Systems

Alongside the enormous volume of user-generated content posted to World Wide Web, there exists a thriving demand for search personalization services. To provide personalized services, a user model is usually required. We...

Tracing Coordination and Cooperation Structures via Semantic Burst Detection

Developing technologies that support collaboration requires understanding how knowledge and expertise are shared and distributed among community members. We explore two forms of knowledge distribution structures, coordin...

A Hybrid Model Ranking Search Result for Research Paper Searching on Social Bookmarking

Social bookmarking and publication sharing systems are essential tools for web resource discovery. The performance and capabilities of search results from research paper bookmarking system are vital. Many researchers use...

Evolving and Controlling Perimeter, Rendezvous, and Foraging Behaviors in a Computation-Free Robot Swarm

Designing and controlling the collective behavior of a swarm often requires complex range, bearing sensors, and peer-to-peer communication strategies. Recent work studying swarm of robots that have no computational power...

Cooperative sensors: a new wired body-sensor-network approach for wearable biopotential measurement

Cooperative sensors are a novel measurement architecture based on active dry electrodes that allows the acquisition of biopotential signals (e.g., electrocardiogram, ECG) on patients in a comfortable and easy-to-integrat...

Download PDF file
  • EP ID EP45707
  • DOI http://dx.doi.org/10.4108/eai.21-12-2015.150819
  • Views 260
  • Downloads 0

How To Cite

Carlos E. Rubio-Medrano, Gail-Joon Ahn, Karsten Sohr (2015). Achieving Security Assurance with Assertion-based Application Construction. EAI Endorsed Transactions on Collaborative Computing, 1(6), -. https://europub.co.uk/articles/-A-45707