메뉴 건너뛰기




Volumn , Issue , 2010, Pages 3-12

Analyzing security architectures

Author keywords

Design; Security; Verification

Indexed keywords

ARCHITECTURAL TYPES; ARCHITECTURE DESCRIPTION LANGUAGES; GLOBAL CONSTRAINTS; JAVA IMPLEMENTATION; OBJECT GRAPHS; OBJECT-ORIENTED IMPLEMENTATION; RUNTIME ARCHITECTURE; RUNTIMES; SECURITY; SECURITY ARCHITECTURE; SECURITY EXPERTS; SEMI-AUTOMATED; SEPARATE ANALYSIS; TARGET ARCHITECTURES;

EID: 78649767916     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1858996.1859001     Document Type: Conference Paper
Times cited : (26)

References (39)
  • 1
    • 78649765530 scopus 로고    scopus 로고
    • www.cs.wayne.edu/~mabianto/cryptodb/2010.
    • (2010)
  • 2
    • 72249099455 scopus 로고    scopus 로고
    • Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
    • M. Abi-Antoun and J. Aldrich. Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations. In OOPSLA, 2009.
    • (2009) OOPSLA
    • Abi-Antoun, M.1    Aldrich, J.2
  • 5
    • 77951490166 scopus 로고    scopus 로고
    • Checking threat modeling data flow diagrams for implementation conformance and security
    • Short paper/poster
    • M. Abi-Antoun, D. Wang, and P. Torr. Checking threat modeling data flow diagrams for implementation conformance and security. In ASE, pages 393-396, 2007. Short paper/poster.
    • (2007) ASE , pp. 393-396
    • Abi-Antoun, M.1    Wang, D.2    Torr, P.3
  • 6
    • 26444441752 scopus 로고    scopus 로고
    • Ownership domains: Separating aliasing policy from mechanism
    • J. Aldrich and C. Chambers. Ownership domains: Separating aliasing policy from mechanism. In ECOOP, 2004.
    • (2004) ECOOP
    • Aldrich, J.1    Chambers, C.2
  • 7
    • 85091966368 scopus 로고    scopus 로고
    • Wedge: Splitting applications into reduced-privilege compartments
    • A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: Splitting applications into reduced-privilege compartments. In NSDI, 2008.
    • (2008) NSDI
    • Bittau, A.1    Marchenko, P.2    Handley, M.3    Karp, B.4
  • 9
    • 78649799139 scopus 로고    scopus 로고
    • CORAS. http://coras.sourceforge.net, 2006.
    • (2006) CORAS
  • 10
    • 0141502155 scopus 로고    scopus 로고
    • An approach for modeling and analysis of security system architectures
    • Y. Deng, J. Wang, J. J. P. Tsai, and K. Beznosov. An approach for modeling and analysis of security system architectures. Knowledge & Data Eng., 15(5), 2003.
    • (2003) Knowledge & Data Eng. , vol.15 , Issue.5
    • Deng, Y.1    Wang, J.2    Tsai, J.J.P.3    Beznosov, K.4
  • 11
    • 68949213770 scopus 로고    scopus 로고
    • Software architecture reconstruction: A process-oriented taxonomy
    • S. Ducasse and D. Pollet. Software architecture reconstruction: a process-oriented taxonomy. TSE, 35(4), 2009.
    • (2009) TSE , vol.35 , Issue.4
    • Ducasse, S.1    Pollet, D.2
  • 12
    • 0006029080 scopus 로고    scopus 로고
    • Acme: Architectural description of component-based systems
    • Cambridge Univ
    • D. Garlan, R. Monroe, and D. Wile. Acme: architectural description of component-based systems. In Component-based systems. Cambridge Univ., 2000.
    • (2000) Component-based Systems
    • Garlan, D.1    Monroe, R.2    Wile, D.3
  • 13
    • 34247099396 scopus 로고    scopus 로고
    • Modular checking for buffer overflows in the large
    • B. Hackett et al. Modular checking for buffer overflows in the large. In ICSE, 2006.
    • (2006) ICSE
    • Hackett, B.1
  • 14
    • 33746885451 scopus 로고    scopus 로고
    • Using SCL to specify and check design intent in source code
    • H. J. Hoover and D. Hou. Using SCL to specify and check design intent in source code. TSE, 32(6), 2006.
    • (2006) TSE , vol.32 , Issue.6
    • Hoover, H.J.1    Hou, D.2
  • 17
    • 0035249574 scopus 로고    scopus 로고
    • Lightweight extraction of object models from bytecode
    • D. Jackson and A. Waingold. Lightweight extraction of object models from bytecode. TSE, 27(2), 2001.
    • (2001) TSE , vol.27 , Issue.2
    • Jackson, D.1    Waingold, A.2
  • 19
    • 77952398976 scopus 로고    scopus 로고
    • Addison-Wesley, Code at
    • K. Kenan. Cryptography in the database. Addison-Wesley, 2006. Code at http://kevinkenan.blogs.com/downloads/cryptodb-code.zip.
    • (2006) Cryptography in the Database
    • Kenan, K.1
  • 20
    • 34248525000 scopus 로고    scopus 로고
    • Identifying and addressing problems in object-oriented framework reuse
    • D. Kirk, M. Roper, and M. Wood. Identifying and addressing problems in object-oriented framework reuse. Empirical Softw. Eng., 12(3), 2006.
    • (2006) Empirical Softw. Eng. , vol.12 , Issue.3
    • Kirk, D.1    Roper, M.2    Wood, M.3
  • 21
    • 34547169524 scopus 로고    scopus 로고
    • A comparison of static architecture compliance checking approaches
    • J. Knodel and D. Popescu. A comparison of static architecture compliance checking approaches. In WICSA, 2007.
    • (2007) WICSA
    • Knodel, J.1    Popescu, D.2
  • 22
    • 78649771512 scopus 로고    scopus 로고
    • Architecture reconstruction: Tutorial on reverse engineering to the architectural level
    • R. Koschke. Architecture reconstruction: Tutorial on reverse engineering to the architectural level. In Intl. Summer School on Software Engineering, 2008.
    • (2008) Intl. Summer School on Software Engineering
    • Koschke, R.1
  • 23
    • 57749192483 scopus 로고    scopus 로고
    • Information flow control for standard OS abstractions
    • M. Krohn et al. Information flow control for standard OS abstractions. In SOSP, 2007.
    • (2007) SOSP
    • Krohn, M.1
  • 24
    • 0242655790 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML, 2002.
    • (2002) UML
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 25
    • 0029373110 scopus 로고
    • An event-based architecture definition language
    • D. C. Luckham and J. Vera. An event-based architecture definition language. TSE, 21(9), 1995.
    • (1995) TSE , vol.21 , Issue.9
    • Luckham, D.C.1    Vera, J.2
  • 26
    • 67349241496 scopus 로고    scopus 로고
    • Microsoft threat modeling tool. http://msdn.microsoft.com/en-us/security/ sdl-threat-modeling-tool.aspx, 2007.
    • (2007) Microsoft Threat Modeling Tool
  • 27
    • 13844296853 scopus 로고    scopus 로고
    • Parameterized object sensitivity for points-to analysis for Java
    • A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for Java. TOSEM, 14(1), 2005.
    • (2005) TOSEM , vol.14 , Issue.1
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 31
    • 0035308156 scopus 로고    scopus 로고
    • Software reflexion models: Bridging the gap between design and implementation
    • G. C. Murphy, D. Notkin, and K. J. Sullivan. Software reflexion models: Bridging the gap between design and implementation. TSE, 27(4), 2001.
    • (2001) TSE , vol.27 , Issue.4
    • Murphy, G.C.1    Notkin, D.2    Sullivan, K.J.3
  • 32
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, 1999.
    • (1999) POPL
    • Myers, A.C.1
  • 33
    • 0032684782 scopus 로고    scopus 로고
    • Parametric shape analysis via 3-valued logic
    • M. Sagiv, T. Reps, and R. Wilhelm. Parametric shape analysis via 3-valued logic. In POPL, 1999.
    • (1999) POPL
    • Sagiv, M.1    Reps, T.2    Wilhelm, R.3
  • 34
    • 33947144602 scopus 로고    scopus 로고
    • Discovering architectures from running systems
    • B. Schmerl, J. Aldrich, D. Garlan, R. Kazman, and H. Yan. Discovering architectures from running systems. TSE, 32(7), 2006.
    • (2006) TSE , vol.32 , Issue.7
    • Schmerl, B.1    Aldrich, J.2    Garlan, D.3    Kazman, R.4    Yan, H.5
  • 35
    • 39049094497 scopus 로고    scopus 로고
    • Monitoring compliance of a software system with its high-level design models
    • M. Sefika, A. Sane, and R. H. Campbell. Monitoring compliance of a software system with its high-level design models. In ICSE, 1996.
    • (1996) ICSE
    • Sefika, M.1    Sane, A.2    Campbell, R.H.3
  • 38
    • 27644580707 scopus 로고    scopus 로고
    • Demystifying the threat-modeling process
    • P. Torr. Demystifying the threat-modeling process. IEEE Security & Privacy, 3(5), 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5
    • Torr, P.1
  • 39
    • 85094632142 scopus 로고    scopus 로고
    • Securing distributed systems with information flow control
    • N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In NSDI, 2008.
    • (2008) NSDI
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Mazières, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.