Files in this item



application/pdfA Catalog of Se ... rogram Transformations.pdf (336kB)
(no description provided)PDF


Title:A Catalog of Security-oriented Program Transformations
Author(s):Hafiz, Munawar; Adamczyk, Paul; Johnson, Ralph
Subject(s):computer security
Abstract:Security requirements change, but the typical way of improving system security by patches is ad hoc and has not produced good results. Security improvements should be systematic, just as new features can be added to software systematically. It would be easier to improve the security of a system if we had a catalog of security-oriented program transformations that could be used to plan changes, to divide the work to make changes, and as a target of automation. This paper describes a catalog of security-oriented program transformations that were derived from security patterns. It describes several ways of categorizing these transformations, our first attempts at validating the catalog, and how the catalog can be used to improve the security of systems.
Issue Date:2009-02
Genre:Technical Report
Other Identifier(s):UIUCDCS-R-2009-3031
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-23

This item appears in the following Collection(s)

Item Statistics