Heyman, Thomas; Yskout, Koen; Scandariato, Riccardo; Schmidt, Holger and Yu, Yijun
This is the latest version of this eprint.
PDF (Accepted Manuscript)
- Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
|DOI (Digital Object Identifier) Link:||http://doi.org/10.1007/978-3-642-19125-1_13|
|Google Scholar:||Look up in Google Scholar|
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.
|Item Type:||Conference Item|
|Copyright Holders:||2011 Springer-Verlag Berlin Heidelberg|
|Project Funding Details:||
|Extra Information:||Engineering Secure Software and Systems
Third International Symposium, ESSoS 2011
Madrid, Spain, February 9-10, 2011
Proceedings published in Lecture Notes in Computer Science.
Úlfar Erlingsson Roel Wieringa Nicola Zannone (Eds.)
The original publication is available at www.springerlink.com.
|Keywords:||security; software architecture; requirements; patterns|
|Academic Unit/Department:||Mathematics, Computing and Technology > Computing & Communications
Mathematics, Computing and Technology
|Interdisciplinary Research Centre:||Centre for Research in Computing (CRC)|
|Depositing User:||Yijun Yu|
|Date Deposited:||21 Mar 2011 09:31|
|Last Modified:||23 Feb 2016 20:20|
|Share this page:|
Available Versions of this Item
The Security Twin Peaks. (deposited 21 Mar 2011 09:07)
- The Security Twin Peaks. (deposited 21 Mar 2011 09:31) [Currently Displayed]
Download history for this item
These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.