TY - GEN
T1 - Merging integration solutions for architecture and security mismatch
AU - Payton, Jamie
AU - Jónsdóttir, Gerður
AU - Flagg, Daniel
AU - Gamble, Rose
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2002.
PY - 2002
Y1 - 2002
N2 - Integrating COTS products into a composite application can reduce development effort and associated costs. A major drawback comes from interoperability problems that hinder the seamless integration of components. Two types of problems are prominent: architecture mismatch and security mismatch. Because of their distinct properties, each problem is currently analyzed separately. The results are integration solutions that are constructed in isolation. Combining these solutions can yield another set of problems if their functionality is conflicting, duplicated, or overly complex. It is imperative to address these issues in component based software development. In this paper, we depict the architectural differences among components, their security access control policies, and the integration solutions that result from independent analysis. This is the first step toward including architectural interoperability issues and security conflicts in the design of an encompassing solution for an integrated application. We show a composition of the two solutions, highlighting redundancy and complexity.
AB - Integrating COTS products into a composite application can reduce development effort and associated costs. A major drawback comes from interoperability problems that hinder the seamless integration of components. Two types of problems are prominent: architecture mismatch and security mismatch. Because of their distinct properties, each problem is currently analyzed separately. The results are integration solutions that are constructed in isolation. Combining these solutions can yield another set of problems if their functionality is conflicting, duplicated, or overly complex. It is imperative to address these issues in component based software development. In this paper, we depict the architectural differences among components, their security access control policies, and the integration solutions that result from independent analysis. This is the first step toward including architectural interoperability issues and security conflicts in the design of an encompassing solution for an integrated application. We show a composition of the two solutions, highlighting redundancy and complexity.
UR - https://www.scopus.com/pages/publications/84957022603
UR - https://www.scopus.com/pages/publications/84957022603#tab=citedBy
U2 - 10.1007/3-540-45588-4_19
DO - 10.1007/3-540-45588-4_19
M3 - Conference contribution
AN - SCOPUS:84957022603
SN - 3540431004
SN - 9783540431008
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 199
EP - 208
BT - COTS-Based Software Systems - 1st International Conference, ICCBSS 2002, Proceedings
A2 - Dean, John
A2 - Gravel, Andrée
PB - Springer Verlag
T2 - 1st International Conference on COTS-Based Software Systems, ICCBSS 2002
Y2 - 4 February 2002 through 6 February 2002
ER -