Security Benefits from Software Architecture

4 downloads 6851 Views 312KB Size Report
tion in a con guration¼based distributed programming environment. Key-words: Security, System customization, Software architecture, Specification match- ing.
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE

Security Benefits from Software Architecture Christophe Bidan & Val´erie Issarny

N ˚ 3114 F´evrier 1997 ` THEME 1

ISSN 0249-6399

apport de recherche

 

 

 !#"$&%')(* +, 

-./1032145!6.+7980;:< =?>A@B=7('!< " 9A'B$'9 5C" 1&1 "3D # B A@/!'!="! = = " H



&

,

S



4

º»Àp¸‹³›¾›¾1¸‹· ³

- '



C   : %; Q  P  ;  C $ B)LN3T  $  T D  -@   ;  C $   " B)/ P)  $  TF $  -@  



C   : %; 0 B  

$ )B LN3T  $  T D  -@  

$   "  )B / P)  $  T D  -@  



 F %;  )%  /   0 P) M ) C   LFC Q  P  0 B  C   Q  P   )B LN3T#  0 B  B)LNAT  Q  P    )B / )P    0 B   B)/ P)



y m „]\ g P$w )

"

PIs l [ gim tr„yk! YY h’ ad–N[ g P¦s h QRq h trPItpa›Y1Ÿ

a M P m tFaZP g”’ [psbP h]’ a M P  l P,Y”c_Y”aZP1Q  m tƒs l \ o_m tr„a M P YZq PIs m DsI[‹a mnh tDY h’ a M P   []sIsbPIYiYKs h tFa gih]l q h]lnm sbc ‹– P [ l Y h YZq PIs m™’ cRa M [‹aQB\_ai\ƒ[ l []\_a M PItFa m s1[‹a m™h t h’ s l a”š ykX[t o Y g |Fš yk`s h QRq h trPItFaiY Iº»¸€a M P &P1P o_M [Qš krs MrgZh P o P g q gih a h s h]lm YtrPIP o P o Ÿy m tƒ[ l™l c] ]a M []t ® Ya h a M P h q P g [‹a h]g Y ’˜hpg s h Qq h Y m tr„{[t o s h QRqƒ[ gim tƒ„ YZPIs1\ gim adc YZqDPes m Ds1[a mnh tƒYI a M P lnh „ m s1[ l a hFhpl sI[t • P o_mng Pes a l c Pb^aZPIt o P o a h g Pe[]Y h t [ •Dh \_aRYZPIs1\ gim adc g PIF\ mng P1QRP1tFaiYIŸ /

  1b



oRh tRa M P€Y h’ ad–N[ g P[ g s Mrm aiPIsbaZ\ g Pqƒ[ g [ o_m „pQ ]–,P M [|]P o PIYis gim™• P o []t[qƒq gZh []s M a h Y”q PIs m¨’ c¬[t o hs QRq h YZPYZPIs1\ gim adc g PIF\ mng P1QRP1tFaiY h]’ Y h’ ad–N[ g P¤YZc_YdaiP1Q¬YIŸ LNM P m tFaZPI„ g [‹a m™h t h’ a Mƒm Y`[]qrq gih [ps M m t a M P  ±›²‹³e´°µ]¶_·Z¸‹¹3º»²‹³D¼”½›¸¾1¿›À$P1t| mngZh trQRP1tFaq gih | m‘o PeY[ ’˜g []QRP1– h]gi® P1tƒ[ •rlnm tr„`a M P[qrq lnm s1[‹a m™h t o P1|]P l™h qDP g Y$ž»P]Ÿ „ƒŸn “¾1¿›±b¶_· º ¹ R¸³ ¸Iµp¿1·›¾”¡Na h YZq PIs m™’ cXYZPIs1\ gim adc g Pep\ m™g P1QRP1tFa›Y h’ a M P m™g Y h’ ad–N[ g P$s h Qš q h tƒP1tFaiYIŸ LNM []t ® YNa hm a›Y lnh „ m s1[ l a hh]l  _a M P  P1t| mngZh trQRP1tFa M [t o_l PeYYZPIsb\ gZm adcXYZqDPes m Ds1[a mnh tƒY a hR• \ mnlno a M P{sb\ƒY”a h Q mn£ P o¤g \rtFa m QRPbš YZcY”aZPIQ¯a M [‹aQRP1P1aiY,a M PIYZP g Pep\ m™g P1QRP1tFa›Y1Ÿ LNM PYZP1qD[ g [‹a mnh t • P1ad– PIP1tRY”Pesb\ gim adcBs h tƒYda g [ m tFa›Y+[]t om QRq l P1QRP1tFa›[‹a mnh t m YZYZ\rP m Y M P l q ’ \ l t h a h t l c ’˜hpg ¾1¿›±b¶_· º ¹ R¸³ ¸1µF¿1·›¾K– MrhM [|pPa h€m QRq l P1QRP1tFas h QRq l Pb^{[]qrq lnm sI[‹a mnh tDY m tB[s h tFa gih]lnl P o [t o YZPIs1\ g P –N[c]  • \_a—[ l Y h’˜h]g ¿b³!À‹¼ ¶¾1¿b·›¾[]qrq lnm sI[‹a mnh tDY– Mrm s M sI[tHYZqDPes m™’ ca M P m™g¦h –t­YZPIsb\ gZm adc g PIF\ mng P1QRP1tFaiY ’˜hpg`m tpaiP g []sba mnh t [Q h tƒ„ a M P m™g Y h]’ ad–,[ g P*s h QRq h trP1tFaiYIŸ LNM P g PIYZ\ l a m tr„ g \ƒtpa m QRP1š¥YZc_YdaiP1Q m YRa M P1t s1\ƒY”a h Q mn£ P o a h QRP1P1a—a M P`[]qrq lnm sI[‹a mnh t g PeF\ m™g P1QRPItpa›Y¦– m a M g PIYZqDPes a—a h a M PRYZc_YdaiP1Q g PIF\ mng P1QRP1tFaiY ž;Y”q PIs m DP o¤• c*¾1¿i±1¶_· º ¹ R¸³ ¸1µF¿1·›¾d¡bŸ N[pY”P

%#



%#





GSR A >G T

¿›±b¶_· º ¹ ¿1³ ¿;´ ¹;¾ ›·Z²  

² ›¹ !)¸·Z¿ €·i± _º ¹¥¿›±1¹;¶_·Z¿







S‹~



  %;  )%F  I @0  B)0   0 ) C  5 C Q  P  0 B  C   Q P  )B LNAT6  0 B   B) NAT  Q P   )B /)P    0 B    B)/ P)   D    ;  ))     %C

 %  L :H -  I Q  P    L     

 %  L :H -    0 B          F  01     )P / P  C6-  I /     P)/ P C6-     LFC 5 )%    C '  4)DD   T>FNSM ;QU>BR? LT 5 B , C 5    ,Q  P  %C  0 B   F*%C 5 *  C  )% 5#  # L%F , C  5  C

    L+;I &; # 016!J) .  ? $+@  + +' (#  +B A '  $&  "(#C  ( &  D   ( H? %$G T

¿›±b¶_· º ¹ ¿1³ ¿;´ ¹;¾ ›·Z²  

² ›¹ !)¸·Z¿ €·i± _º ¹¥¿›±1¹;¶_·Z¿ 



Se}



 B /Q 0=@( & ( ?$& ( &  #" 8 @  P)/ 24?  /Q  5Q @B)/ P/  8 NSB?  7 <   !/ 0 P B)/ -@;P)LT  0 P) M 0=!;@ -M / P P)LT  ?SB / P) Q5PR@;B)0=3  &(#&' !#" # .-. . + +' (#  &    ( $&%   ( $ $  %

Suggest Documents