Copy the page URI to the clipboard
Heyman, Thomas; Yskout, Koen; Scandariato, Riccardo; Schmidt, Holger and Yu, Yijun
(2011).

This is the latest version of this eprint.
DOI: https://doi.org/10.1007/978-3-642-19125-1_13
Abstract
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.
Viewing alternatives
Available Versions of this Item
-
The Security Twin Peaks. (deposited 21 Mar 2011 09:07)
- The Security Twin Peaks. (deposited 21 Mar 2011 09:31) [Currently Displayed]
Download history
Metrics
Public Attention
Altmetrics from AltmetricNumber of Citations
Citations from DimensionsItem Actions
Export
About
- Item ORO ID
- 28408
- Item Type
- Conference or Workshop Item
- Project Funding Details
-
Funded Project Name Project ID Funding Body Not Set Not Set EU FP7 SecureChange - Extra Information
-
Engineering Secure Software and Systems
Third International Symposium, ESSoS 2011
Madrid, Spain, February 9-10, 2011
Proceedings published in Lecture Notes in Computer Science.
Úlfar Erlingsson Roel Wieringa Nicola Zannone (Eds.)
ISSN 0302-9743
e-ISSN 1611-3349
ISBN 978-3-642-19124-4
e-ISBN 978-3-642-19125-1
The original publication is available at www.springerlink.com. - Keywords
- security; software architecture; requirements; patterns
- Academic Unit or School
-
Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM) - Research Group
- Centre for Research in Computing (CRC)
- Copyright Holders
- © 2011 Springer-Verlag Berlin Heidelberg
- Depositing User
- Yijun Yu