is associated with the system and it is a big risk for system and result in surplus maintenance cost. It is due to many reasons those are not considered during the stages of System Development Life Cycle (SDLC). During SDLC it may be reduced to minimum level. Millions of dollars waste due to vulnerable application and rescind working. Most of the software are not secure and cause Physical and Financial mutilation. It may not be possible to eliminate vulnerability completely but it might be reduced to the minimum level because it is the ongoing process. A web application using secure design patterns (SDPs) is presented in this paper. Two secure design patterns and their implementation are given. Secure Strategy Design Pattern (SSDP) and Secure Builder Design Pattern (SBDP) are purposed for two different forms SSDP is used for Driver information page and SBDP is used for Route information page. Special codes are used for inquiring whether valid user is using site or not. A class of encryption/decryption technique is added to add security. An encryption/decryption technique named SHA-1 is used. The result shows that SDPs are beneficial to all application developers especially for the developers of critical and sensitive systems. The system suits secure and design pattern makes it simple to understand its functionality. However, any other encryption/decryption techniques may also be applied on it in place of SHA-1. In future we plan to attach this class with other design patterns to make them secure from attackers and eliminate vulnerable points. Many features can be included in web application with the help of different design patterns and can be secured by attaching encryption/decryption class.
[1]
Kevin Lano,et al.
Design Patterns: Applications and Open Issues
,
2014,
Cyberpatterns.
[2]
E. B. Fernandez,et al.
Determining role rights from use cases
,
1997,
RBAC '97.
[3]
Ralph Johnson,et al.
design patterns elements of reusable object oriented software
,
2019
.
[4]
Xiaohong Yuan,et al.
Semantic Analysis Patterns
,
2000,
ER.
[5]
Linda Rising.
Understanding the Power of Abstraction in Patterns
,
2007,
IEEE Software.
[6]
Max Jacobson,et al.
A Pattern Language: Towns, Buildings, Construction
,
1981
.
[7]
Eduardo B. Fernandez,et al.
Layers and non-functional patterns
,
2003
.
[8]
Douglas C. Schmidt,et al.
Using design patterns to develop reusable object-oriented communication software
,
1995,
CACM.
[9]
Theodor Richardson,et al.
Secure Software Design
,
2012
.
[10]
Gary McGraw,et al.
Exploiting Software: How to Break Code
,
2004
.
[11]
Robert C. Seacord,et al.
Secure Design Patterns
,
2009
.
[12]
Laurie A. Williams,et al.
Hacker or hero? - extreme programming today (panel session)
,
2000,
OOPSLA '00.