Open Access Open Access  Restricted Access Subscription Access

Object Oriented Secure Modeling using SELinux Trusted Operating System


Affiliations
1 Bharati Vidyapeeth's Institute of Computers Applications and Management (BVICAM), Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India
2 MAIT, Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India
 

This research paper proposes the object oriented experimental setup for secure web application development and use of security performance flexibility model to keep high security in web applications. This model allows system administrators to skip or disable some unnecessary security checks in distributed trusted operating systems through which they can effectively balance their performance needs without compromising the security of the system. For example, system admin can tell that video on demand server is allowed to skip only security checks on reading files, while database server is allowed to skip only security checks on seeking files. Which operation is need to be skipped and which operation is not need to be skipped is very much subjective in nature, this will depend upon the user’s requirement and the particular application’s requirement. The selection of these operations and system calls for a particular application is the part of software requirement elicitation process. This UML 2.0 based research work proposes object-oriented class-based software development, source code generation in C++ and the integration of security engineering into a model-driven software development.

Keywords

SELinux, SPF, Forward Engineering, DTOS, UML 2.0.
User
Notifications
Font Size

  • Davis, J. P. (2009). Propositional logic constraint patterns and their use in UML-based conceptual modelling and analysis. IEEE Transactions on Knowledge and Data Engineering, 19(3).
  • Andrian, M.; and Denys, P. (2011). Using the conceptual cohesion of classes for fault prediction in object-oriented systems. IEEE Transactions on Software Engineering, 34(2).
  • Barbara, P.; and Myra, S. (2012). Privacy-preserving query log mining for business confidentiality protection. ACM Transactions on the Web, 4(3).
  • Nitish Pathak, Girish Sharma and B. M. Singh “Forward Engineering Based Implementation of TOS in Social Networking” published in International Journal of Computer Applications, Volume 102 Number 11, Sep-2014, pp: 33-38, ISSN: 0975 8887.Foundation of Computer Science, New York, USA.
  • Sara, C.; and Davide, M. (2013). A model-driven methodology to the content layout problem in web applications. ACM Transactions on the Web, 6(3).
  • Selby, R.W.; and Basili, V.R. (1987). Clean room software development: an empirical evaluation. IEEE Trans. Software Eng., 13(9), 1027-1037.
  • Betty, H.C.C.; and Enoch, Y. W. (2002). Formalizing and integrating the dynamic model for objectoriented modelling. IEEE Transactions on Software Engineering, 28(8).
  • Nitish Pathak and Neelam Sharma “SPF BASED SELINUX OPERATING SYSTEM FOR
  • MULTIMEDIA APPLICATIONS.” Published in International Journal of Reviews in Computing, ISSN: 2076-3328, pp.97-101, Vol.8, December2011.
  • Luiz, A. R.; and Daniel, S. (2006). An authoring environment for model-driven web applications.
  • WebMedia'06, November 19–22, 2006, Natal, RN.
  • Simona, B.; Jos,´E. M.; and Dorina, C. P. (2012). Dependability modelling and analysis of software systems specified with UML. ACM Computing Surveys, 45(1).
  • Michel, R. V. C.; Werner, H.; and Ariadi, N. (2012). How effective is UML modelling? An empirical perspective on costs and benefits. Softw Syst Model, 571–580, Springer-Verlag.
  • Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Trusted operating system based model-driven development of secure web applications. Paper accepted for CSI - 2015; CSI - 50th Golden Jubilee Annual Convention, International Conference.
  • Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Towards designing of SPF based secure web application using UML 2.0. International Journal of Systems Assurance Engineering and Management, Springer.
  • Marco, B.; Stefano, C.; and Piero, F. (2006). Process modelling in web applications. ACM Transactions on Software Engineering and Methodology, 15(4).
  • Georgia, M. K.; Dimitrios, A. K.; Christos, A. P.; Nikolaos, D. T.; and Iakovos, S. V. (2008). Modeldriven development of composite web applications. iiWAS2008, November 24–26, Linz, Austria.
  • Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Experimental designing of SPF based secure web application using forward engineering. IEEE and IETE Sponsored 9th International Conference, BVICAM, New Delhi.
  • Peter, D.; Timothy, W.; and Prashant, S. (2012). Modellus: automated modelling of complex internet data center applications. ACM Transactions on the Web, 6(2).
  • Pathak, N.; Sharma, G.; and Singh, B. M. (2017). UML 2.0 Based Framework for the Development of Secure Web Application.BVICAM's International Journal of Information Technology (BIJIT), DOI: 10.1007/s141870-017-0001-3, February, 2017, Springer
  • Kim, H.; Zhang, Y.; Oussena, S.; and Clark, T. (2009), A case study on model driven data integration for data centric software development. ACM, 2009.
  • Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Experimental analysis of SPF based secure web application. International Journal of Modern Education and Computer Science (IJMECS), 7(2), 48-55, Hong Kong.
  • Thiago, J.; Bittar, R.; Fortes, P. M.; and Luanna, L.L. (2009). Web communication and interaction modelling using model-driven development. SIGDOC’09, 5–7, 2009, Bloomington, Indiana, USA.

Abstract Views: 186

PDF Views: 0




  • Object Oriented Secure Modeling using SELinux Trusted Operating System

Abstract Views: 186  |  PDF Views: 0

Authors

Nitish Pathak
Bharati Vidyapeeth's Institute of Computers Applications and Management (BVICAM), Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India
Neelam Sharma
MAIT, Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India

Abstract


This research paper proposes the object oriented experimental setup for secure web application development and use of security performance flexibility model to keep high security in web applications. This model allows system administrators to skip or disable some unnecessary security checks in distributed trusted operating systems through which they can effectively balance their performance needs without compromising the security of the system. For example, system admin can tell that video on demand server is allowed to skip only security checks on reading files, while database server is allowed to skip only security checks on seeking files. Which operation is need to be skipped and which operation is not need to be skipped is very much subjective in nature, this will depend upon the user’s requirement and the particular application’s requirement. The selection of these operations and system calls for a particular application is the part of software requirement elicitation process. This UML 2.0 based research work proposes object-oriented class-based software development, source code generation in C++ and the integration of security engineering into a model-driven software development.

Keywords


SELinux, SPF, Forward Engineering, DTOS, UML 2.0.

References