Cargando…
Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model
The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the ear...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9258847/ https://www.ncbi.nlm.nih.gov/pubmed/35793370 http://dx.doi.org/10.1371/journal.pone.0270702 |
_version_ | 1784741638961102848 |
---|---|
author | Ullah, Ubaid Faiz, Rizwan Bin Haleem, Muhammad |
author_facet | Ullah, Ubaid Faiz, Rizwan Bin Haleem, Muhammad |
author_sort | Ullah, Ubaid |
collection | PubMed |
description | The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the early stages of software engineering. Hence, there is a need to mitigate these threats at the design stage. Security threats, specifically authentication threats, crosscut other functional and non-functional requirements when modeled using the object-oriented paradigm. This not only makes the design complex but also results in tangling and scattering problems. We therefore model authentication threats using the aspect-oriented modeling (AOM) technique since it separates crosscutting concerns and localizes them as separate units called aspects. Our main research aim is to remove scattering and tangling in security threats modeling using all the core features of the aspect-oriented technique. In this paper, we propose a research approach to model security threats and their mitigation in mal sequence diagram. Using this approach, our contribution makes a clear difference from previous work. Our first contribution is the modeling of authentication threats in the mal sequence diagram using the security profile and AOM profile. Our second contribution is the mathematical verification of the aspect-oriented mal sequence woven model in terms of correctness and completeness. Using the proposed approach, the scattering and tangling from the resultant woven model are successfully removed at the design stage. Thus, the complexity of models and the time and effort required for future modifications of design models are reduced. |
format | Online Article Text |
id | pubmed-9258847 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-92588472022-07-07 Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model Ullah, Ubaid Faiz, Rizwan Bin Haleem, Muhammad PLoS One Research Article The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the early stages of software engineering. Hence, there is a need to mitigate these threats at the design stage. Security threats, specifically authentication threats, crosscut other functional and non-functional requirements when modeled using the object-oriented paradigm. This not only makes the design complex but also results in tangling and scattering problems. We therefore model authentication threats using the aspect-oriented modeling (AOM) technique since it separates crosscutting concerns and localizes them as separate units called aspects. Our main research aim is to remove scattering and tangling in security threats modeling using all the core features of the aspect-oriented technique. In this paper, we propose a research approach to model security threats and their mitigation in mal sequence diagram. Using this approach, our contribution makes a clear difference from previous work. Our first contribution is the modeling of authentication threats in the mal sequence diagram using the security profile and AOM profile. Our second contribution is the mathematical verification of the aspect-oriented mal sequence woven model in terms of correctness and completeness. Using the proposed approach, the scattering and tangling from the resultant woven model are successfully removed at the design stage. Thus, the complexity of models and the time and effort required for future modifications of design models are reduced. Public Library of Science 2022-07-06 /pmc/articles/PMC9258847/ /pubmed/35793370 http://dx.doi.org/10.1371/journal.pone.0270702 Text en © 2022 Ullah et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Ullah, Ubaid Faiz, Rizwan Bin Haleem, Muhammad Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
title | Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
title_full | Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
title_fullStr | Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
title_full_unstemmed | Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
title_short | Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
title_sort | modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9258847/ https://www.ncbi.nlm.nih.gov/pubmed/35793370 http://dx.doi.org/10.1371/journal.pone.0270702 |
work_keys_str_mv | AT ullahubaid modelingandverificationofauthenticationthreatsmitigationinaspectorientedmalsequencewovenmodel AT faizrizwanbin modelingandverificationofauthenticationthreatsmitigationinaspectorientedmalsequencewovenmodel AT haleemmuhammad modelingandverificationofauthenticationthreatsmitigationinaspectorientedmalsequencewovenmodel |