SlideShare a Scribd company logo
1 of 6
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290
3492
Object Oriented Secure Modeling using SELinux
Trusted Operating System
Dr. Nitish Pathak1
*
1
Bharati Vidyapeeth's Institute of Computers Applications and Management (BVICAM),
Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India
Email: nitishforyou@gmail.com
Neelam Sharma
2
MAIT, Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India
-------------------------------------------------------------------ABSTRACT----------------------------------------------------------------
This research paper proposes the object oriented experimental setup for secure web application development and
use of security performance flexibility model to keep high security in web applications. This model allows system
administrators to skip or disable some unnecessary security checks in distributed trusted operating systems
through which they can effectively balance their performance needs without compromising the security of the
system. For example, system admin can tell that video on demand server is allowed to skip only security checks
on reading files, while database server is allowed to skip only security checks on seeking files. Which operation is
need to be skipped and which operation is not need to be skipped is very much subjective in nature, this will
depend upon the user’s requirement and the particular application’s requirement. The selection of these
operations and system calls for a particular application is the part of software requirement elicitation process.
This UML 2.0 based research work proposes object-oriented class-based software development, source code
generation in C++ and the integration of security engineering into a model-driven software development.
Keywords: SELinux, SPF, Forward engineering, DTOS, UML 2.0
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Jan 03, 2018 Date of Acceptance: Jan 23, 2018
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
In the last decade, there has been vast growth in the field
of networking, sharing of data worldwide. And then comes
the most extensively used thing Internet have made cyber
security a very crucial aspect of research and development.
Its matter of concern for both the common users and
researchers connected all over the world. Despite of lot of
works undergoing we are still unable to get something that
reliable and silver bullet that it may provide us with
complete security for our systems. Being so advanced we
still lack the basic potential to create such a system that is
capable of stopping viruses and accessing our confidential
data from our systems [1]. The security methods
developed, researched till yet are implemented in the
application layer of the computers which is making our
systems more prone to data insecurity. These methods
includes encryption using a key i.e. cryptography, using
firewalls, access control using authentication, and
application layer access control. The most two burning
domains are Cryptography and authentication techniques
in which max research is being done. Although these are
something very difficult to crack but no one knows the
dynamic minds making some of probability of data
insecurity [2]. To some extent using firewalls and
application layer access control have helped us but they do
have a drawback. These two techniques can help in
stopping the attacks using viruses uploaded on internet but
fails to protect from internal security issue thus finally
making our system vulnerable [3].
The biggest threat to our application layer is viruses and
Trojan Horses. Once these two enters in our system they
have the potential to access and even modify each and
every data present on the system. Now these days, to
overcome the threats operating system application layer
and the network entry points is used to implement the
security measures. Although no preventive measures are
used inside the kernel of Operating Systems. It is believed
that security measures in kernel are much more effective
than the application layer [4]. In fact, after lot of research
such operating systems have been developed which have
much more mechanisms inside the OS kernel providing us
very good level of security thus securing our systems [5].
In reality, trusted operating systems are better choice for
web applications to maintain the security concern, but this
security will come at a cost. By using trusted systems, our
web application will be more and more secure, but due to
more security checks, the performance of the same system
will disgrace in all respect [6].
The Security is not something expected not only by big
organizations but also by common consumers so now
concerns are being there on this and many vendors are
trying hard to fix the issue. The companies which came up
with some promising operating systems with security
features are Argus-Systems Group, HP, and Sun
Microsystems [7]. Open Source OS are also providing
well secured kernel having excellent security features and
commonly known as secure systems, operating systems.
National Security Agency has released the most secured
and that too open source operating system called as SEL
Linux. Proper definitions of secure system vary from
organization to organization [8]. These secure Systems are
more complex for computer administrators to handle and
manage. Such secure Systems require much more extra
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290
3493
effort and time to setup the desired security policy on the
part of administrator [9]. The implementation of security
policies, as per the requirement of user, is very complex in
such systems. In this research paper, we are suggesting
SEL Linux trusted operating systems for maintaining the
security concern in web applications[10][11].
In the proposed design and development, we are using
UML2.0 based conceptual modeling for the development
of secure application. It makes the programming simpler,
more effective and manageable [12]. This research work
proposes SPF based secure software analysis, SPF based
secure software design and SPF based secure software
development. Far above the ground, quality of software
design is necessary for the success of software [13].
II. TRUSTED OPERATING SYSTEM BASED
SECURE WEB APPLICATIONS
The essential structural design of this operating system is
shown in Fig.1. Just for a reminder to the readers;
architecture is just a concept although implementation can
be done in a lot of ways. The architecture of traditional
operating systems is given in Fig. 1(a). System call
interface helps the application and middleware interface to
communicate with the Operating System [14].
(a)Ordinary
operating systems
(b) Proposed structure of trusted
operating systems
Fig. 1: Structure of trusted operating systems and ordinary
operating systems.
Fig. 1.(a), Illustrating thin or slim security layer of
operating systems kernel security checks. Now in order to
provide higher security, lots of security checks are there in
kernel of Trusted Operating Systems. Fig. 1(b)
demonstrates the additional security checks in the kernel.
This will cause trusted operating systems to be slower than
standard operating systems [15]. Fig.1 (b) clearly depicts
the thicker layer of kernel security checks. What all
security measures are being taken in the kernel security
check depends all on implementation and modeling. But
the disadvantage of having extra security check is that
whenever user tries to do any useful work it need to
undergo all the checks thus deteriorating the system
overall performance[16][17].
III. PROBLEM EXPLANATION AND OBJECT
ORIENTED SOLUTION METHODOLOGY
Before moving into the problem, we are dealing, first we
will be talking about the basic principles of Secure
Operating Systems. As was mentioned previously, the
term Trusted OS is interpreted differently and vary from
one company to another software company. During system
programming, company develops the system software
according to the requirement of end users. But there are
some important features in all Trusted Operating Systems.
They are as follows Least Privilege, Mandatory Access
Control (MAC), Discretionary Access Control (DAC) and
auditing [18][21].
For example, admin of the system can disable all the read
checks in web server because they are actually useless
which finally increases throughput of the web server. Web
server deals with sole public data and public information.
Since majority of data is public on any web server, task of
checking it during read from disk is something useless
because this data is already readable by each and every
user using internet [19]. The real task of security comes
when it comes to writing access. For any web server
integrity is the main issue rather than its confidentiality.
As we had stated that there are many types of workloads
that are continuously being checked by the security
mechanisms of kernel in which many of them are very
much useless or undesired in a Trusted Operating System.
Primary concern of these workloads is quality as well as
integrity of data rather than security of certain operations
since the data they consist can be public [20]. This let us
conclude that by disabling security measures of some parts
of OS performance can be increased.
The essential structural design of distributed trusted
operating systems (DTOS) and Flask is revealed in Figure
2. Unlike the conventional methods of adding more and
more security layers at the kernel level, we are suggesting
two supplementary or extra subsystems in this structural
design. The responsibility of object manager in this model
is to call the security server each time whenever a system
user tries to access an object. Particular security server
confirms the security pattern and informs the respective
object manager if permission for requested operation is
granted or denied. In this design approach we have to
notice that the security server is not at all the component
of the kernel. It is a different and separate part that can be
called as per requirement, by the kernel. These different
modules of the security server also can be altered or
changed. This is the main reason that’s why DTOS as well
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290
3494
as Flask both are built and implemented upon kernels.
Almost security policies can be implemented if we
consider security server as a separate part or separate
module. These separate modules can be easily modified as
per web applications requirement. This is not hard and fast
that security need always will be unchanging or statically
placed within the kernel. These security needs and
implementation will vary from one real life application to
another.
The implementations of web application for maintain the
security is very much subjective in nature. The security
requirement for the same will depend upon the user’s
needs. The object manager all the time calls the security
server for checking the granted permissions. If security
server grants permission for particular operations, then ok,
operation or specific system call will be passed to kernel
layer for execution. If permission is not granted, requested
operations will not execute.
Fig. 2: Flexible security policy architecture for trusted operating systems
The security features and security policies can be altered,
as per need, dynamically as the system is in execution
phase. Security layer will execute the security checks
according to new altered security policies. In order to
boost performance in DTOS as well as in Flask, security
policy caching was recommended as a means to strengthen
performance. The mainly referenced security checks are
stored in a software-implemented cache, located in the
module of object manager. This can surely increase the
performance of systems. By caching recent security
policies in the object manager, few parts of the security
check can be ignored. In this case, if security policies
changed by authentic user, new security policies will be
implemented with immediate effects. As stated all over
this section, it seems the future of security in operating
systems is dependent on two major factors. These two
factors or themes are the development of TOS with very
easier system administration work and system
programming methods to apply a massive variety of
security policies. At the time of implementation, these
massive varieties of security policies will vary from one
application to another.
IV. OBJECT ORIENTED SECURE MODELING
FOR WEB APPLICATION
Object Oriented is an ever-growing discipline and since
there lies, uncertainty for what really establishes sense of
object-orientation; this encapsulates the nucleus factor and
defines the vocabulary to be used in the remaining of
theory. Object-Oriented Development is a set of practices
and approaches for manufacturing software systems
grounded on real world abstractions. Object-Oriented
approach delivers a relatively smooth approach for
progressing from analysis, to design, through to
implementation.
Object oriented development is presently the most
accepted software development style. UML has now
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290
3495
become the language of choice intended for developers
who wish to imagine and model the system underneath
progress. UML is used in many customs for expressing the
concepts such as software specification, website structure
and business modeling. In the proposed design and
development, we are using UML2.0 based conceptual
modeling for the development of secure application.
In object oriented class diagram, designer will identify the
classes. These classes can be identified through software
requirement specification (SRS). As normal practices,
actors of use case diagram are considered as classes and
the use cases are considered as member functions or
methods of the classes. When we want to model the
structure of a system or a web application, we can make
use of object oriented class diagram. We develop the
component based class diagram. In Store Stock Control
Based Web Application, storing objects may be sales
clerk, inventory, Credit card, Cheque, store manager,
Payment, Person, marketing, stock manager, person,
warehouse person, invoice, system, customer etc. (See Fig.
3.). The standard class diagram of Store Stock Control is
as follows in Fig. 3.
Fig. 3: Class diagram for online store stock control web application.
The class wise equivalent C++ code of this case study is
as follows-
Sample Code of C++ for understanding:
class Person
{
public:
//##ModelId=553C976E01C4
GetDeatils();
//##ModelId=553C97750038
SetDeatils();
private:
//##ModelId=553C971B02D3
String Name;
//##ModelId=553C97380226
String Phone;
//##ModelId=553C975B0001
String Address;
};
#include "Person.h"
//##ModelId=553C9B4C0295
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290
3496
class Customer : public Person
{
public:
//##ModelId=553C9B890326
Make_Payment();
private:
//##ModelId=553C9B5A003E
Person Name;
//##ModelId=553C9B5E0028
Person Phone;
//##ModelId=553C9B64019E
person Address;
//##ModelId=553C9B680189
String Credit_Card;
//##ModelId=553C9B6F0007
Integer Cash_Amount;
};
#endif /*
#include "Person.h"
//##ModelId=553C99010386
class Stock Manager : public Person
{
public:
//##ModelId=553C99340150
Check_Demand();
//##ModelId=553C99380262
Monitor_Stock_Level();
//##ModelId=553C9940011C
Monitor_Weekly_Run_Rates();
//##ModelId=553C994F005E
Order_Stock();
private:
//##ModelId=553C9912016D
Person Name;
//##ModelId=553C991601B4
Person Phone;
//##ModelId=553C991B0229
Person Address;
//##ModelId=553C9920005D
String Stock_Status;
};
#endif /*
WAREHOUSE_STAFF_H_HEADER_INCLUDED_AAC
32
A1B */
//##ModelId=553C9C2202FC
class WareHouse Staff
{
public:
//##ModelId=553C9C4B0368
Book_Stock();
private:
//##ModelId=553C9C2B02DE
String Stock_Status;
//##ModelId=553C9C330009
Stock_Description;
};
#endif /*
With the help of above software development process,
developers can identify software Metrics like no. of data
members, no. of data members per super class, no. of data
members per sub class, member functions, the length of
the program, Volume, vocabulary of a program, average
number of live variables, Count of executable statements,
member functions per class, data structure metrics, and
information flow etc. These software Metrics can be
identified through Hallstead software science measures
and data structure metrics .With the help of above
mentioned approach, software project planning will
become easier to developers.
V. RESULTS AND DISCUSSION OF SELINUX
TRUSTED OPERATING SYSTEM
SELinux trusted operating system is better choice for the
development of secure web applications. Table 1and table
2 shows the performance results that are appropriate to
security performance flexibility (SPF). These tables
showing the results with SPF, without SPF and showing
the performance compression. Through SPF model of
SELinux operating system, we can implement the high
security concerns for web applications.
TABLE 1: SECURITY CHECKS EXECUTED IN SELINUX
TRUSTED OPERATING SYSTEM.
File System Tests SELinux
without SPF
SELinux
with
System-SPF
model
Random Disk Reads (K)
per second
94167 93135
Random Disk Writes (K)
per second
79188 79508
Sequential Disk Reads
(K) per second
335527 325591
Sequential Disk Writes
(K) per second
149616 153174
Disk Copies (K) per
second
102252 102744
TABLE 2: SECURITY CHECKS SKIPPED IN SELINUX TRUSTED
OPERATING SYSTEM.
File System Tests SELinux
Without
SPF
SELinux
with
System-SPF
model
Random Disk Reads (K)
per second
94167 99762
Random Disk Writes (K)
per second
79188 84768
Sequential Disk Reads
(K) per second
335527 363571
Sequential Disk Writes
(K) per second
149616 159727
Disk Copies (K) per
second
102252 110315
Added advantage of choosing SELinux is being open
source thus allowing modification and change as per your
requirement. Just because of privacy and confidentiality in
Trusted Operating Systems, the source code of any
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290
3497
software company, business and armed forces will not be
available for normal user. So obtaining such source code
in specific language is not as easy as we think. The
privacy and security implementation for any system will
vary from one Development Company to another.
VI. CONCLUSION
This research paper presents a SPF based approach for
web applications and the integration of security
engineering into a model-driven software development.
This research work showcase the effectiveness of UML
2.0 based object oriented modeling with primary focus of
security through the system level SPF in web applications.
This model allowed system administrators to skip or
disable some unnecessary security checks in distributed
trusted operating systems through which they can
effectively balance their performance needs without
compromising the security of the system. In this paper, we
described experiential forward engineering, source code
structuring and restructuring of secure software system.
REFERENCES
[1] Davis, J. P. (2009). Propositional logic constraint
patterns and their use in UML-based conceptual
modelling and analysis. IEEE Transactions on
Knowledge and Data Engineering, 19(3).
[2] Andrian, M.; and Denys, P. (2011). Using the
conceptual cohesion of classes for fault prediction in
object-oriented systems. IEEE Transactions on
Software Engineering, 34(2).
[3] Barbara, P.; and Myra, S. (2012). Privacy-preserving
query log mining for business confidentiality
protection. ACM Transactions on the Web, 4(3).
[4] Nitish Pathak, Girish Sharma and B. M. Singh
“Forward Engineering Based Implementation of TOS
in Social Networking” published in International
Journal of Computer Applications, Volume 102 -
Number 11, Sep-2014, pp: 33-38, ISSN: 0975 -
8887.Foundation of Computer Science, New York,
USA.
[5] Sara, C.; and Davide, M. (2013). A model-driven
methodology to the content layout problem in web
applications. ACM Transactions on the Web, 6(3).
[6] Selby, R.W.; and Basili, V.R. (1987). Clean room
software development: an empirical evaluation. IEEE
Trans. Software Eng., 13(9), 1027-1037.
[7] Betty, H.C.C.; and Enoch, Y. W. (2002). Formalizing
and integrating the dynamic model for object-
oriented modelling. IEEE Transactions on Software
Engineering, 28(8).
[8] Nitish Pathak and Neelam Sharma “SPF BASED
SELINUX OPERATING SYSTEM FOR
MULTIMEDIA APPLICATIONS.” Published in
International Journal of Reviews in Computing,
ISSN: 2076-3328, pp.97-101, Vol.8, December-
2011.
[9] Luiz, A. R.; and Daniel, S. (2006). An authoring
environment for model-driven web applications.
WebMedia'06, November 19–22, 2006, Natal, RN.
[10]Simona, B.; Jos,´E. M.; and Dorina, C. P. (2012).
Dependability modelling and analysis of software
systems specified with UML. ACM Computing
Surveys, 45(1).
[11]Michel, R. V. C.; Werner, H.; and Ariadi, N. (2012).
How effective is UML modelling? An empirical
perspective on costs and benefits. Softw Syst Model,
571–580, Springer-Verlag.
[12]Pathak, N.; Sharma, G.; and Singh, B. M. (2015).
Trusted operating system based model-driven
development of secure web applications. Paper
accepted for CSI - 2015; CSI - 50th Golden Jubilee
Annual Convention, International Conference.
[13]Pathak, N.; Sharma, G.; and Singh, B. M. (2015).
Towards designing of SPF based secure web
application using UML 2.0. International Journal of
Systems Assurance Engineering and
Management, Springer.
[14]Marco, B.; Stefano, C.; and Piero, F. (2006). Process
modelling in web applications. ACM Transactions on
Software Engineering and Methodology, 15(4).
[15]Georgia, M. K.; Dimitrios, A. K.; Christos, A. P.;
Nikolaos, D. T.; and Iakovos, S. V. (2008). Model-
driven development of composite web applications.
iiWAS2008, November 24–26, Linz, Austria.
[16]Pathak, N.; Sharma, G.; and Singh, B. M. (2015).
Experimental designing of SPF based secure web
application using forward engineering. IEEE and
IETE Sponsored 9th International Conference,
BVICAM, New Delhi.
[17]Peter, D.; Timothy, W.; and Prashant, S. (2012).
Modellus: automated modelling of complex internet
data center applications. ACM Transactions on the
Web, 6(2).
[18]Pathak, N.; Sharma, G.; and Singh, B. M. (2017).
UML 2.0 Based Framework for the Development of
Secure Web Application.BVICAM's International
Journal of Information Technology (BIJIT), DOI:
10.1007/s141870-017-0001-3, February, 2017,
Springer
[19]Kim, H.; Zhang, Y.; Oussena, S.; and Clark, T.
(2009), A case study on model driven data
integration for data centric software development.
ACM, 2009.
[20]Pathak, N.; Sharma, G.; and Singh, B. M. (2015).
Experimental analysis of SPF based secure web
application. International Journal of Modern
Education and Computer Science (IJMECS), 7(2),
48-55, Hong Kong.
[21]Thiago, J.; Bittar, R.; Fortes, P. M.; and Luanna, L.L.
(2009). Web communication and interaction
modelling using model-driven development.
SIGDOC’09, 5–7, 2009, Bloomington, Indiana,
USA.

More Related Content

What's hot

Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...eSAT Publishing House
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with PrivacyIRJET Journal
 
Informatio_Security_Guidelines_Networks
Informatio_Security_Guidelines_NetworksInformatio_Security_Guidelines_Networks
Informatio_Security_Guidelines_NetworksSayyed Zakir Ali Rizwe
 
Design of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy LevelDesign of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy LevelIOSRJEEE
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2eSAT Journals
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...eSAT Publishing House
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9Ian Sommerville
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 

What's hot (17)

Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
9.system analysis
9.system analysis9.system analysis
9.system analysis
 
Paper4
Paper4Paper4
Paper4
 
IRJET - Scrutinize the Utility of Preserved Data with Privacy
IRJET -  	  Scrutinize the Utility of Preserved Data with PrivacyIRJET -  	  Scrutinize the Utility of Preserved Data with Privacy
IRJET - Scrutinize the Utility of Preserved Data with Privacy
 
Informatio_Security_Guidelines_Networks
Informatio_Security_Guidelines_NetworksInformatio_Security_Guidelines_Networks
Informatio_Security_Guidelines_Networks
 
Design of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy LevelDesign of Intrusion Tolerance System based on Service Redundancy Level
Design of Intrusion Tolerance System based on Service Redundancy Level
 
IRS_Tier_2_Compiler_Policy_V3
IRS_Tier_2_Compiler_Policy_V3IRS_Tier_2_Compiler_Policy_V3
IRS_Tier_2_Compiler_Policy_V3
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
Ch10-Software Engineering 9
Ch10-Software Engineering 9Ch10-Software Engineering 9
Ch10-Software Engineering 9
 
Trackment
TrackmentTrackment
Trackment
 

Similar to Object Oriented Secure Modeling using SELinux Trusted Operating System

IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET Journal
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...IJNSA Journal
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...CSCJournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxaulasnilda
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxcroftsshanon
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automationjohnnywess
 

Similar to Object Oriented Secure Modeling using SELinux Trusted Operating System (20)

IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automation
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Object Oriented Secure Modeling using SELinux Trusted Operating System

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290 3492 Object Oriented Secure Modeling using SELinux Trusted Operating System Dr. Nitish Pathak1 * 1 Bharati Vidyapeeth's Institute of Computers Applications and Management (BVICAM), Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India Email: nitishforyou@gmail.com Neelam Sharma 2 MAIT, Guru Gobind Singh Indraprastha University (GGSIPU), New Delhi, India -------------------------------------------------------------------ABSTRACT---------------------------------------------------------------- This research paper proposes the object oriented experimental setup for secure web application development and use of security performance flexibility model to keep high security in web applications. This model allows system administrators to skip or disable some unnecessary security checks in distributed trusted operating systems through which they can effectively balance their performance needs without compromising the security of the system. For example, system admin can tell that video on demand server is allowed to skip only security checks on reading files, while database server is allowed to skip only security checks on seeking files. Which operation is need to be skipped and which operation is not need to be skipped is very much subjective in nature, this will depend upon the user’s requirement and the particular application’s requirement. The selection of these operations and system calls for a particular application is the part of software requirement elicitation process. This UML 2.0 based research work proposes object-oriented class-based software development, source code generation in C++ and the integration of security engineering into a model-driven software development. Keywords: SELinux, SPF, Forward engineering, DTOS, UML 2.0 -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Jan 03, 2018 Date of Acceptance: Jan 23, 2018 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION In the last decade, there has been vast growth in the field of networking, sharing of data worldwide. And then comes the most extensively used thing Internet have made cyber security a very crucial aspect of research and development. Its matter of concern for both the common users and researchers connected all over the world. Despite of lot of works undergoing we are still unable to get something that reliable and silver bullet that it may provide us with complete security for our systems. Being so advanced we still lack the basic potential to create such a system that is capable of stopping viruses and accessing our confidential data from our systems [1]. The security methods developed, researched till yet are implemented in the application layer of the computers which is making our systems more prone to data insecurity. These methods includes encryption using a key i.e. cryptography, using firewalls, access control using authentication, and application layer access control. The most two burning domains are Cryptography and authentication techniques in which max research is being done. Although these are something very difficult to crack but no one knows the dynamic minds making some of probability of data insecurity [2]. To some extent using firewalls and application layer access control have helped us but they do have a drawback. These two techniques can help in stopping the attacks using viruses uploaded on internet but fails to protect from internal security issue thus finally making our system vulnerable [3]. The biggest threat to our application layer is viruses and Trojan Horses. Once these two enters in our system they have the potential to access and even modify each and every data present on the system. Now these days, to overcome the threats operating system application layer and the network entry points is used to implement the security measures. Although no preventive measures are used inside the kernel of Operating Systems. It is believed that security measures in kernel are much more effective than the application layer [4]. In fact, after lot of research such operating systems have been developed which have much more mechanisms inside the OS kernel providing us very good level of security thus securing our systems [5]. In reality, trusted operating systems are better choice for web applications to maintain the security concern, but this security will come at a cost. By using trusted systems, our web application will be more and more secure, but due to more security checks, the performance of the same system will disgrace in all respect [6]. The Security is not something expected not only by big organizations but also by common consumers so now concerns are being there on this and many vendors are trying hard to fix the issue. The companies which came up with some promising operating systems with security features are Argus-Systems Group, HP, and Sun Microsystems [7]. Open Source OS are also providing well secured kernel having excellent security features and commonly known as secure systems, operating systems. National Security Agency has released the most secured and that too open source operating system called as SEL Linux. Proper definitions of secure system vary from organization to organization [8]. These secure Systems are more complex for computer administrators to handle and manage. Such secure Systems require much more extra
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290 3493 effort and time to setup the desired security policy on the part of administrator [9]. The implementation of security policies, as per the requirement of user, is very complex in such systems. In this research paper, we are suggesting SEL Linux trusted operating systems for maintaining the security concern in web applications[10][11]. In the proposed design and development, we are using UML2.0 based conceptual modeling for the development of secure application. It makes the programming simpler, more effective and manageable [12]. This research work proposes SPF based secure software analysis, SPF based secure software design and SPF based secure software development. Far above the ground, quality of software design is necessary for the success of software [13]. II. TRUSTED OPERATING SYSTEM BASED SECURE WEB APPLICATIONS The essential structural design of this operating system is shown in Fig.1. Just for a reminder to the readers; architecture is just a concept although implementation can be done in a lot of ways. The architecture of traditional operating systems is given in Fig. 1(a). System call interface helps the application and middleware interface to communicate with the Operating System [14]. (a)Ordinary operating systems (b) Proposed structure of trusted operating systems Fig. 1: Structure of trusted operating systems and ordinary operating systems. Fig. 1.(a), Illustrating thin or slim security layer of operating systems kernel security checks. Now in order to provide higher security, lots of security checks are there in kernel of Trusted Operating Systems. Fig. 1(b) demonstrates the additional security checks in the kernel. This will cause trusted operating systems to be slower than standard operating systems [15]. Fig.1 (b) clearly depicts the thicker layer of kernel security checks. What all security measures are being taken in the kernel security check depends all on implementation and modeling. But the disadvantage of having extra security check is that whenever user tries to do any useful work it need to undergo all the checks thus deteriorating the system overall performance[16][17]. III. PROBLEM EXPLANATION AND OBJECT ORIENTED SOLUTION METHODOLOGY Before moving into the problem, we are dealing, first we will be talking about the basic principles of Secure Operating Systems. As was mentioned previously, the term Trusted OS is interpreted differently and vary from one company to another software company. During system programming, company develops the system software according to the requirement of end users. But there are some important features in all Trusted Operating Systems. They are as follows Least Privilege, Mandatory Access Control (MAC), Discretionary Access Control (DAC) and auditing [18][21]. For example, admin of the system can disable all the read checks in web server because they are actually useless which finally increases throughput of the web server. Web server deals with sole public data and public information. Since majority of data is public on any web server, task of checking it during read from disk is something useless because this data is already readable by each and every user using internet [19]. The real task of security comes when it comes to writing access. For any web server integrity is the main issue rather than its confidentiality. As we had stated that there are many types of workloads that are continuously being checked by the security mechanisms of kernel in which many of them are very much useless or undesired in a Trusted Operating System. Primary concern of these workloads is quality as well as integrity of data rather than security of certain operations since the data they consist can be public [20]. This let us conclude that by disabling security measures of some parts of OS performance can be increased. The essential structural design of distributed trusted operating systems (DTOS) and Flask is revealed in Figure 2. Unlike the conventional methods of adding more and more security layers at the kernel level, we are suggesting two supplementary or extra subsystems in this structural design. The responsibility of object manager in this model is to call the security server each time whenever a system user tries to access an object. Particular security server confirms the security pattern and informs the respective object manager if permission for requested operation is granted or denied. In this design approach we have to notice that the security server is not at all the component of the kernel. It is a different and separate part that can be called as per requirement, by the kernel. These different modules of the security server also can be altered or changed. This is the main reason that’s why DTOS as well
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290 3494 as Flask both are built and implemented upon kernels. Almost security policies can be implemented if we consider security server as a separate part or separate module. These separate modules can be easily modified as per web applications requirement. This is not hard and fast that security need always will be unchanging or statically placed within the kernel. These security needs and implementation will vary from one real life application to another. The implementations of web application for maintain the security is very much subjective in nature. The security requirement for the same will depend upon the user’s needs. The object manager all the time calls the security server for checking the granted permissions. If security server grants permission for particular operations, then ok, operation or specific system call will be passed to kernel layer for execution. If permission is not granted, requested operations will not execute. Fig. 2: Flexible security policy architecture for trusted operating systems The security features and security policies can be altered, as per need, dynamically as the system is in execution phase. Security layer will execute the security checks according to new altered security policies. In order to boost performance in DTOS as well as in Flask, security policy caching was recommended as a means to strengthen performance. The mainly referenced security checks are stored in a software-implemented cache, located in the module of object manager. This can surely increase the performance of systems. By caching recent security policies in the object manager, few parts of the security check can be ignored. In this case, if security policies changed by authentic user, new security policies will be implemented with immediate effects. As stated all over this section, it seems the future of security in operating systems is dependent on two major factors. These two factors or themes are the development of TOS with very easier system administration work and system programming methods to apply a massive variety of security policies. At the time of implementation, these massive varieties of security policies will vary from one application to another. IV. OBJECT ORIENTED SECURE MODELING FOR WEB APPLICATION Object Oriented is an ever-growing discipline and since there lies, uncertainty for what really establishes sense of object-orientation; this encapsulates the nucleus factor and defines the vocabulary to be used in the remaining of theory. Object-Oriented Development is a set of practices and approaches for manufacturing software systems grounded on real world abstractions. Object-Oriented approach delivers a relatively smooth approach for progressing from analysis, to design, through to implementation. Object oriented development is presently the most accepted software development style. UML has now
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290 3495 become the language of choice intended for developers who wish to imagine and model the system underneath progress. UML is used in many customs for expressing the concepts such as software specification, website structure and business modeling. In the proposed design and development, we are using UML2.0 based conceptual modeling for the development of secure application. In object oriented class diagram, designer will identify the classes. These classes can be identified through software requirement specification (SRS). As normal practices, actors of use case diagram are considered as classes and the use cases are considered as member functions or methods of the classes. When we want to model the structure of a system or a web application, we can make use of object oriented class diagram. We develop the component based class diagram. In Store Stock Control Based Web Application, storing objects may be sales clerk, inventory, Credit card, Cheque, store manager, Payment, Person, marketing, stock manager, person, warehouse person, invoice, system, customer etc. (See Fig. 3.). The standard class diagram of Store Stock Control is as follows in Fig. 3. Fig. 3: Class diagram for online store stock control web application. The class wise equivalent C++ code of this case study is as follows- Sample Code of C++ for understanding: class Person { public: //##ModelId=553C976E01C4 GetDeatils(); //##ModelId=553C97750038 SetDeatils(); private: //##ModelId=553C971B02D3 String Name; //##ModelId=553C97380226 String Phone; //##ModelId=553C975B0001 String Address; }; #include "Person.h" //##ModelId=553C9B4C0295
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290 3496 class Customer : public Person { public: //##ModelId=553C9B890326 Make_Payment(); private: //##ModelId=553C9B5A003E Person Name; //##ModelId=553C9B5E0028 Person Phone; //##ModelId=553C9B64019E person Address; //##ModelId=553C9B680189 String Credit_Card; //##ModelId=553C9B6F0007 Integer Cash_Amount; }; #endif /* #include "Person.h" //##ModelId=553C99010386 class Stock Manager : public Person { public: //##ModelId=553C99340150 Check_Demand(); //##ModelId=553C99380262 Monitor_Stock_Level(); //##ModelId=553C9940011C Monitor_Weekly_Run_Rates(); //##ModelId=553C994F005E Order_Stock(); private: //##ModelId=553C9912016D Person Name; //##ModelId=553C991601B4 Person Phone; //##ModelId=553C991B0229 Person Address; //##ModelId=553C9920005D String Stock_Status; }; #endif /* WAREHOUSE_STAFF_H_HEADER_INCLUDED_AAC 32 A1B */ //##ModelId=553C9C2202FC class WareHouse Staff { public: //##ModelId=553C9C4B0368 Book_Stock(); private: //##ModelId=553C9C2B02DE String Stock_Status; //##ModelId=553C9C330009 Stock_Description; }; #endif /* With the help of above software development process, developers can identify software Metrics like no. of data members, no. of data members per super class, no. of data members per sub class, member functions, the length of the program, Volume, vocabulary of a program, average number of live variables, Count of executable statements, member functions per class, data structure metrics, and information flow etc. These software Metrics can be identified through Hallstead software science measures and data structure metrics .With the help of above mentioned approach, software project planning will become easier to developers. V. RESULTS AND DISCUSSION OF SELINUX TRUSTED OPERATING SYSTEM SELinux trusted operating system is better choice for the development of secure web applications. Table 1and table 2 shows the performance results that are appropriate to security performance flexibility (SPF). These tables showing the results with SPF, without SPF and showing the performance compression. Through SPF model of SELinux operating system, we can implement the high security concerns for web applications. TABLE 1: SECURITY CHECKS EXECUTED IN SELINUX TRUSTED OPERATING SYSTEM. File System Tests SELinux without SPF SELinux with System-SPF model Random Disk Reads (K) per second 94167 93135 Random Disk Writes (K) per second 79188 79508 Sequential Disk Reads (K) per second 335527 325591 Sequential Disk Writes (K) per second 149616 153174 Disk Copies (K) per second 102252 102744 TABLE 2: SECURITY CHECKS SKIPPED IN SELINUX TRUSTED OPERATING SYSTEM. File System Tests SELinux Without SPF SELinux with System-SPF model Random Disk Reads (K) per second 94167 99762 Random Disk Writes (K) per second 79188 84768 Sequential Disk Reads (K) per second 335527 363571 Sequential Disk Writes (K) per second 149616 159727 Disk Copies (K) per second 102252 110315 Added advantage of choosing SELinux is being open source thus allowing modification and change as per your requirement. Just because of privacy and confidentiality in Trusted Operating Systems, the source code of any
  • 6. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3492-3497(2018) ISSN: 0975-0290 3497 software company, business and armed forces will not be available for normal user. So obtaining such source code in specific language is not as easy as we think. The privacy and security implementation for any system will vary from one Development Company to another. VI. CONCLUSION This research paper presents a SPF based approach for web applications and the integration of security engineering into a model-driven software development. This research work showcase the effectiveness of UML 2.0 based object oriented modeling with primary focus of security through the system level SPF in web applications. This model allowed system administrators to skip or disable some unnecessary security checks in distributed trusted operating systems through which they can effectively balance their performance needs without compromising the security of the system. In this paper, we described experiential forward engineering, source code structuring and restructuring of secure software system. REFERENCES [1] Davis, J. P. (2009). Propositional logic constraint patterns and their use in UML-based conceptual modelling and analysis. IEEE Transactions on Knowledge and Data Engineering, 19(3). [2] Andrian, M.; and Denys, P. (2011). Using the conceptual cohesion of classes for fault prediction in object-oriented systems. IEEE Transactions on Software Engineering, 34(2). [3] Barbara, P.; and Myra, S. (2012). Privacy-preserving query log mining for business confidentiality protection. ACM Transactions on the Web, 4(3). [4] Nitish Pathak, Girish Sharma and B. M. Singh “Forward Engineering Based Implementation of TOS in Social Networking” published in International Journal of Computer Applications, Volume 102 - Number 11, Sep-2014, pp: 33-38, ISSN: 0975 - 8887.Foundation of Computer Science, New York, USA. [5] Sara, C.; and Davide, M. (2013). A model-driven methodology to the content layout problem in web applications. ACM Transactions on the Web, 6(3). [6] Selby, R.W.; and Basili, V.R. (1987). Clean room software development: an empirical evaluation. IEEE Trans. Software Eng., 13(9), 1027-1037. [7] Betty, H.C.C.; and Enoch, Y. W. (2002). Formalizing and integrating the dynamic model for object- oriented modelling. IEEE Transactions on Software Engineering, 28(8). [8] Nitish Pathak and Neelam Sharma “SPF BASED SELINUX OPERATING SYSTEM FOR MULTIMEDIA APPLICATIONS.” Published in International Journal of Reviews in Computing, ISSN: 2076-3328, pp.97-101, Vol.8, December- 2011. [9] Luiz, A. R.; and Daniel, S. (2006). An authoring environment for model-driven web applications. WebMedia'06, November 19–22, 2006, Natal, RN. [10]Simona, B.; Jos,´E. M.; and Dorina, C. P. (2012). Dependability modelling and analysis of software systems specified with UML. ACM Computing Surveys, 45(1). [11]Michel, R. V. C.; Werner, H.; and Ariadi, N. (2012). How effective is UML modelling? An empirical perspective on costs and benefits. Softw Syst Model, 571–580, Springer-Verlag. [12]Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Trusted operating system based model-driven development of secure web applications. Paper accepted for CSI - 2015; CSI - 50th Golden Jubilee Annual Convention, International Conference. [13]Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Towards designing of SPF based secure web application using UML 2.0. International Journal of Systems Assurance Engineering and Management, Springer. [14]Marco, B.; Stefano, C.; and Piero, F. (2006). Process modelling in web applications. ACM Transactions on Software Engineering and Methodology, 15(4). [15]Georgia, M. K.; Dimitrios, A. K.; Christos, A. P.; Nikolaos, D. T.; and Iakovos, S. V. (2008). Model- driven development of composite web applications. iiWAS2008, November 24–26, Linz, Austria. [16]Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Experimental designing of SPF based secure web application using forward engineering. IEEE and IETE Sponsored 9th International Conference, BVICAM, New Delhi. [17]Peter, D.; Timothy, W.; and Prashant, S. (2012). Modellus: automated modelling of complex internet data center applications. ACM Transactions on the Web, 6(2). [18]Pathak, N.; Sharma, G.; and Singh, B. M. (2017). UML 2.0 Based Framework for the Development of Secure Web Application.BVICAM's International Journal of Information Technology (BIJIT), DOI: 10.1007/s141870-017-0001-3, February, 2017, Springer [19]Kim, H.; Zhang, Y.; Oussena, S.; and Clark, T. (2009), A case study on model driven data integration for data centric software development. ACM, 2009. [20]Pathak, N.; Sharma, G.; and Singh, B. M. (2015). Experimental analysis of SPF based secure web application. International Journal of Modern Education and Computer Science (IJMECS), 7(2), 48-55, Hong Kong. [21]Thiago, J.; Bittar, R.; Fortes, P. M.; and Luanna, L.L. (2009). Web communication and interaction modelling using model-driven development. SIGDOC’09, 5–7, 2009, Bloomington, Indiana, USA.