To read this content please select one of the options below:

Integrating security design into the software development process for e‐commerce systems

M.T. Chan (City University of Hong Kong, Hong Kong)
L.F. Kwok (City University of Hong Kong, Hong Kong)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 August 2001

5061

Abstract

Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance. Non‐functional requirements such as performance added to the system as an after thought would lead to extremely high cost and undesirable effects. Security, rarely regarded in the past as one of the non‐functional requirements, has to be integrated into the software development process due to its impact on e‐commerce systems. In this paper, a design methodology based on systems security engineering capability maturity model (SSE‐CMM) is proposed to specify design details for the three defined processes: risk, engineering and assurance. By means of an object‐oriented security design pattern, security design covering impact, threats, risks and countermeasures for different parts of an e‐commerce system can be examined systematically in the risk process. The proposed software development process for secured systems (SDPSS), representing the engineering process, consists of four steps: object and collaboration modeling, tier identification, component identification and deployment specification. Selected unified modeling language notations and diagrams are used to support the SDPSS. Using a simplified supply‐chain e‐commerce system as an example, integration of security design into the software development process is shown with discussions of possible security assurance activities that can be performed on a design.

Keywords

Citation

Chan, M.T. and Kwok, L.F. (2001), "Integrating security design into the software development process for e‐commerce systems", Information Management & Computer Security, Vol. 9 No. 3, pp. 112-122. https://doi.org/10.1108/09685220110394758

Publisher

:

MCB UP Ltd

Copyright © 2001, MCB UP Limited

Related articles