Proposed Secure Content Modeling of Web Software Model

Madhuri N. Gedam, Varshapriya J. N, Bandu B. Meshram

Abstract


The tremendous growth of web applications gave rise to number of cyber crimes in the real world. This has neces-sitated the consideration of security features of web application at the beginning stage itself rather than at later stages of web application as it is a very time consuming task and it increases the cost of software system exponentially. The security aspects need to be considered at the planning phase of web application modeling stage. The unique web engineering process content model is proposed to capture all the security requirements through Class diagram and State Transition Diagram in the web-based software application development. The various notations are proposed to provide security requirements in content modeling of Web Engineering. The proposed content modeling of Web Engineering is simulated by the case study- “Smart Agriculture Monitoring System”.


Full Text:

PDF

References


D. Lowe, W. Hall,“Hypermedia and Web:An Engineering Approach”,

John Wiley & Sons, 1999.

H. Elminir, M. Elsoud, A. EI-Halawany,“Uml-based Web Engineering

framework for Modelling Web application”, Journal of Software Engineering,2011.

Ceri, S., Fraternali, P., Brambilla, M., Bongio, A., Comai, S., and Matera,

M.,”Designing data-intensive web applications”, (Morgan Kaufmann,

.

N. Moreno, P. Fraternali and A. Vallecillo,“WebML modelling in UML”,

IET Softw., 2007, 1, (3), pp. 67–80

Paloma Dıaz , Ignacio Aedo, “Towards efficient web engineering approaches through flexible process models”, The Journal of Systems and

Software 80 (2007) 1375–1389, 2006, Elsevier.

V. Tran, N. Truong, A. Nguyen,“An Approach to the Specification of Security Concerns in UML”, Information and Communication Technology,

Griffith University, Nathan, QLD 4111, Australia, Springer-Verlag Berlin

Heidelberg 2013.

S. Almutairi,“An Enhancement on Class Diagram to Model a Secure

Context Aware System”, IEEE, 2017

D. Ingle, Dr. B.B. Meshram, “HybridAnalysis and Design Model for

Building Web Information System”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012.

M. Umair, A. Khan, M. Zulkernine,“A Survey on Requirements and

Design Methods for Secure Software Developments”, Queen’s University

Kingston, Ontario, Canada K7L 3N6.

M. Hussein, M. Zulkernine,“UMLintr: A UML Profile for Specifying

Intrusions”, 13th Annual IEEE International Symposium and Workshop

on Engineering of Computer Based Systems (ECBS’06), IEEE 2006.

P. Hayati, N. Jafari, S. Mohammad, S. Sarenche, “Modeling Input

Validation in UML”, IEEE, pp. 663–672, 2008.

J. Jurjen,“UMLsec: presenting the profile” In: 6th Workshop on Distributed Objects and Components Security. March 18-21, 2002.

L. Deng, W. Xu , S. Frezza. “A Resource-based Approach to Extend

UML Diagrams for Web Applications”, USA, IEEE ,2011.

G.Sindre, A. Opdahl,“Eliciting security Requirements with Misuse case”

Requirement Engineering, vol.10 No.1 Jan, 2005, pp-34-44.

A. Opdahl, G. Sindre,“Experimental Comparison of Attack trees and

misusecases for Threat Identification”, Information and Software Technology, vol.51, 2009, pp.916-932.

M. Diallo, J. Romero-marion ,S. Sim D. Richard,“A Comparitive evaluation of three approaches to identify security requirements” in proceeding

of the REFSQ’06, Luxembourg , 2006.

T. Stalhane, G. Sindre,“ A Comparison of two approaches to safety ˚

analysis based on Use cases”, in proceeding of conceptual modelling E-R

lecture Notes in Computer Science, vol.4801, 2007, pp-423-433.

S. Sengupta ,S. Bhattacharya, “Formalization ofUML Use Case

Diagram-A Z Notation Based Approach”, IEEE, 2006.

M. Szlenk,“Formal Semantics and Reasoning about UML Class Diagram”, Proceedings of the International Conference on Dependability of

Computer Systems, IEEE, 2006.

D. Schwabe, G. Rossi,“The Object-Oriented Hypermedia Design

Model”, Communications of the ACM August 1995/Vol. 38, No. 8, ACM

August 1995.

M. Khan,“ Representing security specifications in UML state machine

diagrams”, International Workshop on Enterprise Web Application Dependability, Elsevier ,EWAD 2015

M. Attar, H. Luqman, P. Karpati, G. Sindre, A. Opdahl, “Extending the

UML Statecharts Notation to Model Security Aspects”, IEEE Transactions on Software Engineering, vol. 41,no.7, pp.661–690, July 2015.

M. J. Peterson, J. B. Bowles, C. M. Eastman, “UMLpac: An

Approach for Integrating Security into UML Class Design”, IEEE,

pp.267–272,2006.

Entity Control Boundary pattern, [Online]. Available:

http://www.cs.sjsu.edu/faculty/pearce/modules/lectures/ooa/analysis/ecb.htm

J. Rivero , J. Grigera ,G Rossi, E. Luna, F. Montero, “MockupDriven Development: Providing agile support for Model-Driven Web

Engineering”, Information and Software Technology , Elsevier, 2014.

K. Patil, N. Kale,“A Model for Smart Agriculture using IoT”, 2016 International Conference on Global Trends in Signal Processing, Information

Computing and Communication (IEEE), 2016.

N. Suma, Sandra Rhea Samson, S. Saranya, G. Shanmugapriya,

R.Subhashr,“ IoT based Smart Agriculture Monitoring System”, International Journal on Recent and Innovation Trends in Computing and

Communication(IJRITCC), Vol.5, Issue 2 , Fab 2017


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology