SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Security Patterns: Research Direction,
Metamodel, Application and Verification
Hironori Washizaki
Waseda University / National Institute of Informatics /
SYSTEM INFORMATION CO., LTD.
Keynote at IWBIS 2017, Jakarta, Sep 24, 2017
In collaboration with many students, researchers and practitioners including
Atsuto Kubo, Yuki Shiroma, Takanori Kobashi, Yurina Ito, Sota Fukumoto,
Misato Yamamoto, Masatoshi Yoshizawa, Tian Xia, Yoshiaki Fukazawa,
Nobukazu Yoshioka, Eduardo B. Fernandez, Haruhiko Kaiya, Takao Okubo,
Atsuo Hazeyama, Takehisa Kato, Shinpei Ogata, Hideyuki Kanuka, Yuki
Kondo, Masayuki Yoshino and Dan Yamamoto
• Prof., Director, Global Software
Engineering Laboratory, Waseda University
• Visiting Prof., National Institute of
Informatics
• Director, SYSTEM INFORMATION CO., LTD.
• Vice-Chair, IEEE CS Japan Chapter
• Chair, SEMAT Japan Chapter
• Convenor, ISO/IEC/JTC1/SC7/WG20
• Director, IPSJ SamurAI Coding: AI
Programing Contest
• PC Chair, IEEE ICST’17 Toyo
• PC Chair, IEEE CSEE&T’17 Georgia
• PC Chair, APSEC’18 Nara
• Local Chair, IEEE COMPSAC’18 Tokyo
• Editor-in-Chief, I. J. Agile and Extreme Dev. 2
Hironori Washizaki
Agenda
• Security Patterns and Research Directions
• Model-Driven Application
• Model-Driven Verification
• Metamodel for Secure Cloud Development
• Conclusion and Future Perspective
3
Security concerns must be addressed at any phase
4
Requirement Design Implementation Test
Security concerns
SecurityTesting
Security Requirement
Patterns
Security Design
Patterns
Security patterns
• Patterns are recurrent problems and solutions under
specific contexts from requirements to maintenance
Maintenance
• Name: Role-based access control (RBAC)
• Problem: How do we assign rights to people based on
their functions or tasks?
• Solution: Assign users to roles and give rights to these
roles so they can perform their tasks.
• Related patterns: Authorization, ...
Example of security pattern
application
Survey on
security pattern
researches
[PLoP’15]
6
[PLoP’15] Systematic Mapping of Security Patterns Research, Conf. Pattern Languages of Programs Conference
Application
46%
Case
studies
13%Modeling
7%
Detection
7%
Validation
7%
Selection
7%
Others
13%
Agenda
• Security Patterns and Research Directions
• Model-Driven Application
• Model-Driven Verification
• Metamodel for Secure Cloud Development
• Conclusion and Future Perspective
7
Appropriate
design
Inappropriate
design
What’s the problem?
8
Role-based access control (RBAC) pattern
①Selecting a pattern
9
②Setting parameters
Input model
Helper def : SubjectName :
String = ’hoge’
: :
< ‥ >
< ‥>
</ ‥>
・・・
< ‥ >
< ‥>
</ ‥>
< ‥>
</ ‥>
・・・
UML models
: :
:
Transformation
rules
③Transformation
by ATL
rule SubjectClass {
from s : UML!Class(s.isSbj())
to t : UML!Class(
namespace <- s.namespace,
isAbstract <- false,
...
Parameter
Model-driven security pattern application
[PLoP’10]
[PLoP’10] Model-Driven Security Patterns Application and Validation,” 17th Conference on Pattern Languages of Programs
10
<<AuthenticatorSubject>>
Employee
id
name
Patient
id
name
Right
accessType
checkRight()
Subject
id
name
ProtectionObject
id
name
<<Authenticator.Subject>>
Employee
id
name
Patient
id
name
Authenticator
Proof_of_Identify
Authentication
Information
<<Creates>>
Authenticator
Proof_of_Identify
<<Creates>>
Authorization
Right
accessType
checkRight()
Helper def : ProtObName :
String = ’Patient’
Parameter
Example: application of “Authorization”
<<Authenticator.Subject>>
<<Authorization.Subject>>
Employee
id
name
Authentication
Information
<<ProtOb>>
Patient
id
name
Subject
id
name
ProtectionObject
id
name
Agenda
• Security Patterns and Research Directions
• Model-Driven Application
• Model-Driven Verification
• Metamodel for Secure Cloud Development
• Conclusion and Future Perspective
11
TESEM: Test Driven Secure Modeling Tool
[ARES’13][ARES’13][IJSSE’14][ICST’15][Information’16]
12
Security
Design
Pattern
Problem
Solution
Context
Test design as
requirement
! create Actor
! create UI :
! create Subject..
Test Script Test case
testing
[ARES’13] Validating Security Design Pattern Applications Using Model Testing, Int’l Conf. Availability, Reliability and Security
[ARES’14] Verification of Implementing Security Design Patterns Using a Test Template, Conf. Availability, Reliability and Security
[IJSSE’14] Validating Security Design Pattern Applications by Testing Design Models, Int’l J. Secure Software Engineering 5(4)
[ICST’15] TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing, IEEE ICST’15 Tools Track
[Information’16] Implementation Support of Security Design Patterns Using Test Templates, Information 7(2)
testing
• Security Properties are in testcases
Add test cases
Confirm tests fail
Fix model
Confirm
tests pass
Test-driven secure design
13
Find
vulnerability
Find
vulnerability
Eval. of
mitigation
Eval. of
mitigation
Verify whether model with RBAC satisfies security design requirements
Add test cases
Verify whether
model satisfies
security design
requirement
14
Model does not satisfy security design requirements.
TESEM detected incorrect applications of design patterns
Confirm tests fail
15
Fix model and confirm tests pass
16
Fix design model until the tests successfully pass.
Correct designIncorrect design
Refactoring
Agenda
• Security Patterns and Research Directions
• Model-Driven Application
• Model-Driven Verification
• Metamodel for Secure Cloud Development
• Conclusion and Future Perspective
17
Challenges in cloud security and privacy (S&P)
18
Software
Application
Platform
Infrastructure
User Authorization
Secure Config.
OS Hardening
Electronic Access
Control system
Cloud
services
Ex.) User
Authentication
Patterns Guidelines
Practices
•How to consistently utilize
diverse S&P knowledge?
 Metamodel
•How to consider S&P
over different layers?
 Layered metamodel
Cloud Security and Privacy Metamodel (CSPM)
[Future Internet’16][SERVICES’16]
19
Problem Bridge Solution
SaaS (Application) PaaS (Platform) IaaS (Infrastructure)
Target
[Future Internet’16] Modeling and Security in Cloud Ecosystems, Future Internet, 8(13)
[SERVICES’16] Metamodel for Security and Privacy Knowledge in Cloud Services, 12th IEEE World Congress on Services
Modeling vulnerability and security pattern
Validator for data-
injection vulnerability
such as XSS
Common Vulnerabilities and Exposures: CVE-2012-4394 Cross-site
scripting (XSS) vulnerability in apps/files/js/filelist.js in own Cloud
before 4.0.5 allows remote attackers to inject arbitrary web script or
HTML via the file parameter.
Security and privacy development process
21
Security requirements analysis
• Threats and vulnerability analysis based
on STRIDE
• Consider corresponding security patterns
(e.g., Authentication and Authorization)
Elevation of privilege
Spoofing
Tampering
Repudiation
Information disclosure
Denial of service
Problem Pattern SolutionExampleGoal Anti-goal
23
Check other player dataAuthentication
Authorization
Agenda
• Security Patterns and Research Directions
• Model-Driven Application
• Model-Driven Verification
• Metamodel for Secure Cloud Development
• Conclusion and Future Perspective
24
Conclusion and future prospects
• Targeting authentication
and authorization
• Many researches using
UML, but independent
• Often simple case
studies
• Targeting existing
patterns only
• Limited education for
secure development
methods in IoT era 25
• Address various security
patterns
• Integration based on
common metamodel
• Complex case studies
with measurements
• New vulnerabilities and
patterns
• IoT and security
education program
Current Future
Vulnerability/count
ermeasure DB
Metamodel
Knowledge base
(2) Decomposition,
organization
クラウドクラウド
DistributionDistribution
CloudCloud
Software system
development
(3) Integrated application
and verification(1) Publishing
E.g., CVE
New attack
Security and privacy ecosystem for Cloud/IoT
PI: Prof. Hironori Washizaki (‘15-’18)
Japanese MEXT Professional Education
Program enPiT-Pro: Smart SE (‘17-’22)
• PI: Prof. Hironori Washizaki
• 14+ universities incl. Osaka U. and Kyushu U.
• 16+ collaborators
27
Cloud
Sensors, IoT
Artificial
Intelligence
BigData
generation
knowledge
extraction
evolution
Network
Cyber physical systemsInfo. processing
Application
Busines
value
creation
Security &
privacy
SamurAI Coding
IPSJ 6th International AI
Programing Contest
World Final
March 14 2018 Tokyo
http://samuraicoding.info
APSEC 2018
25th Asia-Pacific Software
Engineering Conference
Nara
Dec 4-7 (due: June)
PC Chair: H. Washizaki
Int. Journal of Agile and
Extreme Software
Development
(IJAESD)
Editor-in-Chief: H. Washizaki
COMPSAC 2018
42nd IEEE Computer Society Int’l Conf.
Computers, Software & Applications
Tokyo
July 23-27 (due: Jan 15)
29
Terima kasih 감사 합니다 धन्यवाद 有難う Thank you!

Weitere ähnliche Inhalte

Ähnlich wie Security Patterns: Research Direction, Metamodel, Application and Verification

TESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern ApplicationsTESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern ApplicationsHironori Washizaki
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and toolMoutasm Tamimi
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...John M. Willis
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCJohn M. Willis
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Dilum Bandara
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principlesOWASP
 
7.2-0-D8-October2021 (Software Development Security).pptx
7.2-0-D8-October2021 (Software Development Security).pptx7.2-0-D8-October2021 (Software Development Security).pptx
7.2-0-D8-October2021 (Software Development Security).pptxroongrus
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020Brian Levine
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile worldStefan Streichsbier
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Amazon Web Services
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testingCu Nguyen
 
Extract Oct 2019: DSO-LG Rolling Slides
Extract Oct 2019: DSO-LG Rolling SlidesExtract Oct 2019: DSO-LG Rolling Slides
Extract Oct 2019: DSO-LG Rolling SlidesMichael Man
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...cscpconf
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...GoQA
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 

Ähnlich wie Security Patterns: Research Direction, Metamodel, Application and Verification (20)

TESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern ApplicationsTESEM: A Tool for Verifying Security Design Pattern Applications
TESEM: A Tool for Verifying Security Design Pattern Applications
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and tool
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
 
Enumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLCEnumerating software security design flaws throughout the SSDLC
Enumerating software security design flaws throughout the SSDLC
 
SRE[in]con 2019
SRE[in]con 2019SRE[in]con 2019
SRE[in]con 2019
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles
 
Lecture 10.pptx
Lecture 10.pptxLecture 10.pptx
Lecture 10.pptx
 
7.2-0-D8-October2021 (Software Development Security).pptx
7.2-0-D8-October2021 (Software Development Security).pptx7.2-0-D8-October2021 (Software Development Security).pptx
7.2-0-D8-October2021 (Software Development Security).pptx
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile world
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Extract Oct 2019: DSO-LG Rolling Slides
Extract Oct 2019: DSO-LG Rolling SlidesExtract Oct 2019: DSO-LG Rolling Slides
Extract Oct 2019: DSO-LG Rolling Slides
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
ОЛЬГА АКСЬОНЕНКО «Безпечна розробка програмного забезпечення в Agile проектах...
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 

Mehr von Hironori Washizaki

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
IEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions UpdateIEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions UpdateHironori Washizaki
 
鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会
鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会
鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会Hironori Washizaki
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用
TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用
TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用Hironori Washizaki
 
アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225
アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225
アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225Hironori Washizaki
 
Joseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about ArchitectureJoseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about ArchitectureHironori Washizaki
 
世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート
世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート
世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデートHironori Washizaki
 
SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...
SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...
SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...Hironori Washizaki
 
デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向
デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向
デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向Hironori Washizaki
 
SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~
SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~
SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~Hironori Washizaki
 
人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集
人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集
人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集Hironori Washizaki
 
スマートエスイーコンソーシアムの概要と2021年度成果紹介
スマートエスイーコンソーシアムの概要と2021年度成果紹介スマートエスイーコンソーシアムの概要と2021年度成果紹介
スマートエスイーコンソーシアムの概要と2021年度成果紹介Hironori Washizaki
 
DXの推進において企業内に求められる人材やデジタル人材の育て方
DXの推進において企業内に求められる人材やデジタル人材の育て方DXの推進において企業内に求められる人材やデジタル人材の育て方
DXの推進において企業内に求められる人材やデジタル人材の育て方Hironori Washizaki
 
対応性のある運用のパターン
対応性のある運用のパターン対応性のある運用のパターン
対応性のある運用のパターンHironori Washizaki
 
モデル訓練のパターン
モデル訓練のパターンモデル訓練のパターン
モデル訓練のパターンHironori Washizaki
 
パターンのつながりとAI活用成熟度
パターンのつながりとAI活用成熟度パターンのつながりとAI活用成熟度
パターンのつながりとAI活用成熟度Hironori Washizaki
 
データ表現のパターン
データ表現のパターンデータ表現のパターン
データ表現のパターンHironori Washizaki
 
機械学習デザインパターンの必要性と機械学習ライフサイクル
機械学習デザインパターンの必要性と機械学習ライフサイクル機械学習デザインパターンの必要性と機械学習ライフサイクル
機械学習デザインパターンの必要性と機械学習ライフサイクルHironori Washizaki
 
青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)
青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)
青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)Hironori Washizaki
 

Mehr von Hironori Washizaki (20)

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
IEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions UpdateIEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions Update
 
鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会
鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会
鷲崎弘宜, "国際規格ISO/IEC 24773とその意義", 情報処理学会 第86回全国大会
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用
TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用
TISO/IEC JTC1におけるソフトウェア工学知識体系、技術者認証および品質の標準化と研究・教育他への活用
 
アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225
アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225
アジャイル品質のパターンとメトリクス Agile Quality Patterns and Metrics (QA2AQ) 20240225
 
Joseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about ArchitectureJoseph Yoder : Being Agile about Architecture
Joseph Yoder : Being Agile about Architecture
 
世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート
世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート
世界標準のソフトウェア工学知識体系SWEBOK Guide最新第4版を通じた開発アップデート
 
SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...
SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...
SWEBOK Guide Evolution and Its Emerging Areas including Machine Learning Patt...
 
デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向
デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向
デジタルトランスフォーメーション(DX)におけるソフトウェアの側面とダイバーシティ・インクルーシブに関する研究実践動向
 
SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~
SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~
SQuBOKガイドV3概説 ~IoT・AI・DX時代のソフトウェア品質とシステム監査~
 
人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集
人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集
人生100年・60年カリキュラム時代のDX人材育成: スマートエスイー 2021年度成果および2022年度募集
 
スマートエスイーコンソーシアムの概要と2021年度成果紹介
スマートエスイーコンソーシアムの概要と2021年度成果紹介スマートエスイーコンソーシアムの概要と2021年度成果紹介
スマートエスイーコンソーシアムの概要と2021年度成果紹介
 
DXの推進において企業内に求められる人材やデジタル人材の育て方
DXの推進において企業内に求められる人材やデジタル人材の育て方DXの推進において企業内に求められる人材やデジタル人材の育て方
DXの推進において企業内に求められる人材やデジタル人材の育て方
 
対応性のある運用のパターン
対応性のある運用のパターン対応性のある運用のパターン
対応性のある運用のパターン
 
モデル訓練のパターン
モデル訓練のパターンモデル訓練のパターン
モデル訓練のパターン
 
パターンのつながりとAI活用成熟度
パターンのつながりとAI活用成熟度パターンのつながりとAI活用成熟度
パターンのつながりとAI活用成熟度
 
データ表現のパターン
データ表現のパターンデータ表現のパターン
データ表現のパターン
 
機械学習デザインパターンの必要性と機械学習ライフサイクル
機械学習デザインパターンの必要性と機械学習ライフサイクル機械学習デザインパターンの必要性と機械学習ライフサイクル
機械学習デザインパターンの必要性と機械学習ライフサイクル
 
青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)
青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)
青山幹雄先生を偲んで(開拓、理論、実践、コミュニティ&国際)
 

Kürzlich hochgeladen

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Kürzlich hochgeladen (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Security Patterns: Research Direction, Metamodel, Application and Verification

  • 1. Security Patterns: Research Direction, Metamodel, Application and Verification Hironori Washizaki Waseda University / National Institute of Informatics / SYSTEM INFORMATION CO., LTD. Keynote at IWBIS 2017, Jakarta, Sep 24, 2017 In collaboration with many students, researchers and practitioners including Atsuto Kubo, Yuki Shiroma, Takanori Kobashi, Yurina Ito, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Tian Xia, Yoshiaki Fukazawa, Nobukazu Yoshioka, Eduardo B. Fernandez, Haruhiko Kaiya, Takao Okubo, Atsuo Hazeyama, Takehisa Kato, Shinpei Ogata, Hideyuki Kanuka, Yuki Kondo, Masayuki Yoshino and Dan Yamamoto
  • 2. • Prof., Director, Global Software Engineering Laboratory, Waseda University • Visiting Prof., National Institute of Informatics • Director, SYSTEM INFORMATION CO., LTD. • Vice-Chair, IEEE CS Japan Chapter • Chair, SEMAT Japan Chapter • Convenor, ISO/IEC/JTC1/SC7/WG20 • Director, IPSJ SamurAI Coding: AI Programing Contest • PC Chair, IEEE ICST’17 Toyo • PC Chair, IEEE CSEE&T’17 Georgia • PC Chair, APSEC’18 Nara • Local Chair, IEEE COMPSAC’18 Tokyo • Editor-in-Chief, I. J. Agile and Extreme Dev. 2 Hironori Washizaki
  • 3. Agenda • Security Patterns and Research Directions • Model-Driven Application • Model-Driven Verification • Metamodel for Secure Cloud Development • Conclusion and Future Perspective 3
  • 4. Security concerns must be addressed at any phase 4 Requirement Design Implementation Test Security concerns SecurityTesting Security Requirement Patterns Security Design Patterns Security patterns • Patterns are recurrent problems and solutions under specific contexts from requirements to maintenance Maintenance
  • 5. • Name: Role-based access control (RBAC) • Problem: How do we assign rights to people based on their functions or tasks? • Solution: Assign users to roles and give rights to these roles so they can perform their tasks. • Related patterns: Authorization, ... Example of security pattern application
  • 6. Survey on security pattern researches [PLoP’15] 6 [PLoP’15] Systematic Mapping of Security Patterns Research, Conf. Pattern Languages of Programs Conference Application 46% Case studies 13%Modeling 7% Detection 7% Validation 7% Selection 7% Others 13%
  • 7. Agenda • Security Patterns and Research Directions • Model-Driven Application • Model-Driven Verification • Metamodel for Secure Cloud Development • Conclusion and Future Perspective 7
  • 9. ①Selecting a pattern 9 ②Setting parameters Input model Helper def : SubjectName : String = ’hoge’ : : < ‥ > < ‥> </ ‥> ・・・ < ‥ > < ‥> </ ‥> < ‥> </ ‥> ・・・ UML models : : : Transformation rules ③Transformation by ATL rule SubjectClass { from s : UML!Class(s.isSbj()) to t : UML!Class( namespace <- s.namespace, isAbstract <- false, ... Parameter Model-driven security pattern application [PLoP’10] [PLoP’10] Model-Driven Security Patterns Application and Validation,” 17th Conference on Pattern Languages of Programs
  • 10. 10 <<AuthenticatorSubject>> Employee id name Patient id name Right accessType checkRight() Subject id name ProtectionObject id name <<Authenticator.Subject>> Employee id name Patient id name Authenticator Proof_of_Identify Authentication Information <<Creates>> Authenticator Proof_of_Identify <<Creates>> Authorization Right accessType checkRight() Helper def : ProtObName : String = ’Patient’ Parameter Example: application of “Authorization” <<Authenticator.Subject>> <<Authorization.Subject>> Employee id name Authentication Information <<ProtOb>> Patient id name Subject id name ProtectionObject id name
  • 11. Agenda • Security Patterns and Research Directions • Model-Driven Application • Model-Driven Verification • Metamodel for Secure Cloud Development • Conclusion and Future Perspective 11
  • 12. TESEM: Test Driven Secure Modeling Tool [ARES’13][ARES’13][IJSSE’14][ICST’15][Information’16] 12 Security Design Pattern Problem Solution Context Test design as requirement ! create Actor ! create UI : ! create Subject.. Test Script Test case testing [ARES’13] Validating Security Design Pattern Applications Using Model Testing, Int’l Conf. Availability, Reliability and Security [ARES’14] Verification of Implementing Security Design Patterns Using a Test Template, Conf. Availability, Reliability and Security [IJSSE’14] Validating Security Design Pattern Applications by Testing Design Models, Int’l J. Secure Software Engineering 5(4) [ICST’15] TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing, IEEE ICST’15 Tools Track [Information’16] Implementation Support of Security Design Patterns Using Test Templates, Information 7(2) testing
  • 13. • Security Properties are in testcases Add test cases Confirm tests fail Fix model Confirm tests pass Test-driven secure design 13 Find vulnerability Find vulnerability Eval. of mitigation Eval. of mitigation
  • 14. Verify whether model with RBAC satisfies security design requirements Add test cases Verify whether model satisfies security design requirement 14
  • 15. Model does not satisfy security design requirements. TESEM detected incorrect applications of design patterns Confirm tests fail 15
  • 16. Fix model and confirm tests pass 16 Fix design model until the tests successfully pass. Correct designIncorrect design Refactoring
  • 17. Agenda • Security Patterns and Research Directions • Model-Driven Application • Model-Driven Verification • Metamodel for Secure Cloud Development • Conclusion and Future Perspective 17
  • 18. Challenges in cloud security and privacy (S&P) 18 Software Application Platform Infrastructure User Authorization Secure Config. OS Hardening Electronic Access Control system Cloud services Ex.) User Authentication Patterns Guidelines Practices •How to consistently utilize diverse S&P knowledge?  Metamodel •How to consider S&P over different layers?  Layered metamodel
  • 19. Cloud Security and Privacy Metamodel (CSPM) [Future Internet’16][SERVICES’16] 19 Problem Bridge Solution SaaS (Application) PaaS (Platform) IaaS (Infrastructure) Target [Future Internet’16] Modeling and Security in Cloud Ecosystems, Future Internet, 8(13) [SERVICES’16] Metamodel for Security and Privacy Knowledge in Cloud Services, 12th IEEE World Congress on Services
  • 20. Modeling vulnerability and security pattern Validator for data- injection vulnerability such as XSS Common Vulnerabilities and Exposures: CVE-2012-4394 Cross-site scripting (XSS) vulnerability in apps/files/js/filelist.js in own Cloud before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter.
  • 21. Security and privacy development process 21
  • 22. Security requirements analysis • Threats and vulnerability analysis based on STRIDE • Consider corresponding security patterns (e.g., Authentication and Authorization) Elevation of privilege Spoofing Tampering Repudiation Information disclosure Denial of service Problem Pattern SolutionExampleGoal Anti-goal
  • 23. 23 Check other player dataAuthentication Authorization
  • 24. Agenda • Security Patterns and Research Directions • Model-Driven Application • Model-Driven Verification • Metamodel for Secure Cloud Development • Conclusion and Future Perspective 24
  • 25. Conclusion and future prospects • Targeting authentication and authorization • Many researches using UML, but independent • Often simple case studies • Targeting existing patterns only • Limited education for secure development methods in IoT era 25 • Address various security patterns • Integration based on common metamodel • Complex case studies with measurements • New vulnerabilities and patterns • IoT and security education program Current Future
  • 26. Vulnerability/count ermeasure DB Metamodel Knowledge base (2) Decomposition, organization クラウドクラウド DistributionDistribution CloudCloud Software system development (3) Integrated application and verification(1) Publishing E.g., CVE New attack Security and privacy ecosystem for Cloud/IoT PI: Prof. Hironori Washizaki (‘15-’18)
  • 27. Japanese MEXT Professional Education Program enPiT-Pro: Smart SE (‘17-’22) • PI: Prof. Hironori Washizaki • 14+ universities incl. Osaka U. and Kyushu U. • 16+ collaborators 27 Cloud Sensors, IoT Artificial Intelligence BigData generation knowledge extraction evolution Network Cyber physical systemsInfo. processing Application Busines value creation Security & privacy
  • 28. SamurAI Coding IPSJ 6th International AI Programing Contest World Final March 14 2018 Tokyo http://samuraicoding.info APSEC 2018 25th Asia-Pacific Software Engineering Conference Nara Dec 4-7 (due: June) PC Chair: H. Washizaki Int. Journal of Agile and Extreme Software Development (IJAESD) Editor-in-Chief: H. Washizaki COMPSAC 2018 42nd IEEE Computer Society Int’l Conf. Computers, Software & Applications Tokyo July 23-27 (due: Jan 15)
  • 29. 29 Terima kasih 감사 합니다 धन्यवाद 有難う Thank you!