APU Nongenerative and A Generative Pattern Question

User Generated

Oynpx418

Engineering

Abia polytechnic university

Description

  1. What is the difference between a nongenerative and a generative pattern? (5 points)
  2. What are design patterns? Explore four security related design patterns, one pattern that focuses on confidentially, one pattern that focuses on integrity, one pattern that focuses on availability, and a fourth one, that focuses on privacy. Discuss the security problem each of these patterns solve, the context for which the pattern can be applied to and the forces (constraints, limitations). (20 points) Provide references for each.
  3. Consider one of the following interactive applications (20 points)
    1. A secure automated course registration system for a university
    2. A secure library management system
    3. An Internet-based polling booth for public elections
    4. A secure home banking system

Develop a user model, design model, mental model, and an implementation model, for any one of these systems.

  1. Develop two additional design principles that “reduce the user’s memory load.” (5 points)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please view explanation and answer below.

OUTLINE
Title: Introduction to Software Engineering questions
Thesis: Design patterns and interactive application
I.
II.

Difference between a non-generative and a generative pattern

Design pattern
A. Definition
B. Related design patterns
C. Problem that is solved
D. Solution

III.

Interactive application on a secure home banking system
A. User model
B. Design Model
C. Mental Model
D. Implementation Model

IV.

References


Introduction to Software Engineering
Student’s Name
Professor’s Name
Institution Affiliation
Date

Question one
A generative pattern not only represents the issue, the context, and the factors that influence it,
but it also offers a practicable solution to the issue. In contrast, a non-generative pattern explains
the context and the problem but does not give a clear-cut solution.
Question two
Design patterns are reusable solutions to typical software development challenges. They include
security design patterns, which are a subset of patterns that solve issues with security NFRs.
Security patterns are used to represent security methods such as access control and logging in
software architecture. The phrase "security patterns" was initially used in a 1997 publication by
Yoder and Barcalow.
1. Confidentiality
Check Point, Authenticator, Clear Sensitive Information, and Authorization, and so on are
examples of design patterns.
The Authorization pattern describes the subjects who are allowed to access a resource and their
access rights. Permissions are separated from the topic and resources in this approach. It's
adaptable enough to deal with a wide range of topics, resources, and privileges. Privilege sets for
individuals should be defined in security policies and contained in authorization rules. These
authorizing rules will be linked to a resource and a topic (Dangler, 2021).

The Permission, Resource, and Subject are the three players in the Authorization pattern. The
entity that requires access to the Resource is referred to as the Subject. Each Permission indicates
one method for the Subject to access the Resource and includes measures for ensuring that
access is granted.
1. Integrity
Controlled Object Factory, Distrustful Decomposition, Input Validation, Secure Builder Factory,
Secure Chain of Responsibility, and others are all examples of design patterns.
Validation of Input:- The Validation of the Input pattern verifies that the data entered by the
Subject is legitimate and devoid of harmful language. When the Subject's input cannot be
trusted, this pat...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags