메뉴 건너뛰기




Volumn , Issue , 2009, Pages 554-563

Measuring the interplay of security principles in software architectures

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURAL QUALITY; DESIGN STRATEGIES; LEAST PRIVILEGE; SECURITY ENGINEERING; SECURITY PRINCIPLES; SIDE EFFECT; SURFACE REDUCTION;

EID: 72449210147     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ESEM.2009.5315968     Document Type: Conference Paper
Times cited : (3)

References (21)
  • 1
    • 79959561018 scopus 로고    scopus 로고
    • Some thoughts on security after ten years of qmail 1.0
    • ACM
    • D. J. Bernstein. Some thoughts on security after ten years of qmail 1.0. In CSAW '07, pages 1-10. ACM, 2007.
    • (2007) CSAW '07 , pp. 1-10
    • Bernstein, D.J.1
  • 2
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning programs for privilege separation
    • August
    • D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX 13, August 2004.
    • (2004) USENIX 13
    • Brumley, D.1    Song, D.2
  • 3
    • 70349694735 scopus 로고    scopus 로고
    • Identifying and resolving least privilege violations in software architectures
    • K. Buyens, B. De Win, and W. Joosen. Identifying and resolving least privilege violations in software architectures. In ARES, 2009.
    • (2009) ARES
    • Buyens, K.1    De Win, B.2    Joosen, W.3
  • 4
    • 70349910077 scopus 로고    scopus 로고
    • Resolving least privilege violations in software architectures
    • K. Buyens, B. De Win, and W. Joosen. Resolving least privilege violations in software architectures. In SESS '09, 2009.
    • (2009) SESS '09
    • Buyens, K.1    De Win, B.2    Joosen, W.3
  • 5
    • 78049321460 scopus 로고    scopus 로고
    • Process activities supporting security principles
    • K. Buyens, R. Scandariato, and W. Joosen. Process activities supporting security principles. In IWSSE '07, 2007.
    • (2007) IWSSE '07
    • Buyens, K.1    Scandariato, R.2    Joosen, W.3
  • 9
    • 57349158625 scopus 로고    scopus 로고
    • Rubacon: Automated support for model-based compliance engineering
    • S. Höhn and J. Jürjens. Rubacon: automated support for model-based compliance engineering. In ICSE 13, pages 875-878, 2008.
    • (2008) ICSE 13 , pp. 875-878
    • Höhn, S.1    Jürjens, J.2
  • 12
    • 72449127925 scopus 로고    scopus 로고
    • D. Van Landuyt, J. Gregoire, S. Michiels, E. Truyen, and W. Joosen. Architectural design of a digital publishing system. Technical report, Katholieke Univer-siteit Leuven, October 2006.
    • D. Van Landuyt, J. Gregoire, S. Michiels, E. Truyen, and W. Joosen. Architectural design of a digital publishing system. Technical report, Katholieke Univer-siteit Leuven, October 2006.
  • 13
    • 0037368172 scopus 로고    scopus 로고
    • An empirically-based process for software architecture evaluation
    • M. Lindvall, R.T. Tvedt, and P. Costa. An empirically-based process for software architecture evaluation. Empirical Software Engineering, 8(1):83-108, 2003.
    • (2003) Empirical Software Engineering , vol.8 , Issue.1 , pp. 83-108
    • Lindvall, M.1    Tvedt, R.T.2    Costa, P.3
  • 14
    • 67650131779 scopus 로고    scopus 로고
    • A formal model for a system's attack surface
    • Technical report, Carnegie Mellon University CMU, July
    • P. K. Manadhata, D. K. Kaynar, and J. M. Wing. A formal model for a system's attack surface. Technical report, Carnegie Mellon University (CMU), July 2007.
    • (2007)
    • Manadhata, P.K.1    Kaynar, D.K.2    Wing, J.M.3
  • 18
    • 72449155430 scopus 로고    scopus 로고
    • N. Provos. Systrace, interactive policy generation for system calls
    • N. Provos. Systrace - interactive policy generation for system calls.
  • 19
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 20
    • 34547462739 scopus 로고    scopus 로고
    • Towards a measuring framework for security properties of software
    • R. Scandariato, B. De Win, and W. Joosen. Towards a measuring framework for security properties of software. In Quality of Protection '06, pages 27-30, 2006.
    • (2006) Quality of Protection '06 , pp. 27-30
    • Scandariato, R.1    De Win, B.2    Joosen, W.3
  • 21
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.