Towards application driven security dashboards in future middleware

被引:3
作者
Joosen, Wouter [1 ]
Lagaisse, Bert [1 ]
Truyen, Eddy [1 ]
Handekyn, Koen [2 ]
机构
[1] KULeuven, Dept Comp Sci, DistriNet, Celestijnenlaan 200A, B-3001 Heverlee, Belgium
[2] UnifiedPost SA, B-1310 Terhulpen, Belgium
基金
欧盟第七框架计划;
关键词
Middleware; Security; Adaptive middleware; Monitoring; Software-as-a-service;
D O I
10.1007/s13174-011-0047-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Contemporary middleware must facilitate the customization of a built-in services framework, such that non-functional requirements emerging from the engineering process are met. This must be achieved by facilitating adaptation and selection of appropriate services without carrying the load, footprint, and overhead of a bloated system. We illustrate the concept and approach with an example in the domain of security engineering of a large scale, internet based application in the domain of online document processing. In addition, we sketch why such an approach cannot only yield the desired variants of middleware security services, but also application-driven security dashboards, i.e. the tools to monitor and manage the actual security environment. The resulting research findings plead for a research agenda that revisits reflection and that enables model-driven software techniques to be used in the just-in-time generation of co-existing middleware variants.
引用
收藏
页码:107 / 115
页数:9
相关论文
共 28 条
[1]  
Axiomatics, 2010, AX POL SERV 4 0
[2]  
Blair GS, 1998, P IFIP INT C DISTR S
[3]  
Borger WD, 2011, MIDDLEWARE 11
[4]  
Borger WD, 2011, SOFTWARE SYSTEMS TRA
[5]   PERMIS: a modular authorization infrastructure [J].
Chadwick, David ;
Zhao, Gansen ;
Otenko, Sassa ;
Laborde, Romain ;
Su, Linying ;
Nguyen, Tuan Anh .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2008, 20 (11) :1341-1357
[6]   Coordinating access control in grid services [J].
Chadwick, David W. ;
Su, Linying ;
Laborde, Romain .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2008, 20 (09) :1071-1094
[7]  
Clarke M, 2001, LNCS, P160, DOI DOI 10.1007/3-540-45518-3
[8]  
Delaet T, 2007, P 21 C LARG INST SYS
[9]   A taxonomy and catalog of runtime software-fault monitoring tools [J].
Delgado, N ;
Gates, AQ ;
Roach, S .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2004, 30 (12) :859-872
[10]   Access control with IBM Tivoli Access Manager [J].
Karjoth, Günter .
ACM Transactions on Information and System Security, 2003, 6 (02) :232-257