Heyman, Thomas; Yskout, Koen; Scandariato, Riccardo; Schmidt, Holger and Yu, Yijun
This is the latest version of this eprint.
PDF (Accepted Manuscript)
- Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
|DOI (Digital Object Identifier) Link:||http://dx.doi.org/10.1007/978-3-642-19125-1_13|
|Google Scholar:||Look up in Google Scholar|
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.
|Item Type:||Conference Item|
|Copyright Holders:||2011 Springer-Verlag Berlin Heidelberg|
|External Project Funding Details:||
|Extra Information:||Engineering Secure Software and Systems
Third International Symposium, ESSoS 2011
Madrid, Spain, February 9-10, 2011
Proceedings published in Lecture Notes in Computer Science.
Úlfar Erlingsson Roel Wieringa Nicola Zannone (Eds.)
The original publication is available at www.springerlink.com.
|Keywords:||security; software architecture; requirements; patterns|
|Academic Unit/Department:||Mathematics, Computing and Technology > Computing & Communications|
|Interdisciplinary Research Centre:||Centre for Research in Computing (CRC)|
|Depositing User:||Yijun Yu|
|Date Deposited:||21 Mar 2011 09:31|
|Last Modified:||25 Oct 2012 13:39|
Available Versions of this Item
The Security Twin Peaks. (deposited 21 Mar 2011 09:07)
- The Security Twin Peaks. (deposited 21 Mar 2011 09:31) [Currently Displayed]
Actions (login may be required)
|Report issue / request change|