메뉴 건너뛰기




Volumn , Issue , 2011, Pages 127-136

Evaluating security properties of architectures in unpredictable environments: A case for cloud

Author keywords

ATAM; Cloud architectures; Dynamic architectures; Implied Scenario; Security

Indexed keywords

ARCHITECTURAL TRADE-OFF ANALYSIS; ATAM; DYNAMIC ARCHITECTURES; IMPLIED SCENARIO; INDUSTRIAL CASE STUDY; QUALITY ATTRIBUTES; SCENARIO TECHNIQUE; SECURITY; SECURITY PROPERTIES; SECURITY TESTING; SERVICE-BASED SYSTEMS; SOFTWARE-AS-A-SERVICE; TRADE-OFF POINT;

EID: 80052003994     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WICSA.2011.25     Document Type: Conference Paper
Times cited : (21)

References (25)
  • 2
    • 80051977782 scopus 로고    scopus 로고
    • Creating HIPAA-compliant medical data applications with amazon web services
    • Amazon Web Services April
    • Amazon Web Services, "Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services," Amazon Web Services, Tech. Rep., April 2009.
    • (2009) Amazon Web Services, Tech. Rep.
  • 6
    • 18944390715 scopus 로고    scopus 로고
    • Comparison of scenario-based software architecture evaluation methods
    • Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004
    • M. A. Babar and I. Gorton, "Comparison of scenario-based software architecture evaluation methods," in APSEC '04: Proceedings of the 11th Asia-Pacific Software Engineering Conference. Washington, DC, USA: IEEE Computer Society, 2004, pp. 600-607. (Pubitemid 40700564)
    • (2004) Proceedings - Asia-Pacific Software Engineering Conference, APSEC , pp. 600-607
    • Babar, M.A.1    Gorton, I.2
  • 8
    • 0042689501 scopus 로고    scopus 로고
    • Toward a discipline of scenario-based architectural engineering
    • R. Kazman, S. J. Carrière, and S. G. Woods, "Toward a discipline of scenario-based architectural engineering," Ann. Softw. Eng., vol. 9, no. 1-4, pp. 5-33, 2000.
    • (2000) Ann. Softw. Eng. , vol.9 , Issue.1-4 , pp. 5-33
    • Kazman, R.1    Carrière, S.J.2    Woods, S.G.3
  • 12
    • 70449775106 scopus 로고    scopus 로고
    • Security characterization for evaluation of software architectures using atam
    • ICICT '09. International Conference on, aug.
    • A. Raza, H. Abbas, L. Yngstrom, and A. Hemani, "Security characterization for evaluation of software architectures using atam," in Information and Communication Technologies, 2009. ICICT '09. International Conference on, aug. 2009, pp. 241-246.
    • (2009) Information and Communication Technologies, 2009 , pp. 241-246
    • Raza, A.1    Abbas, H.2    Yngstrom, L.3    Hemani, A.4
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0036036577 scopus 로고    scopus 로고
    • Security attribute evaluation method: A cost-benefit approach
    • S. A. Butler, "Security attribute evaluation method: a cost-benefit approach," in Proceedings of the 24th International Conference on Software Engineering, ser. ICSE '02. New York, NY, USA: ACM, 2002, pp. 232-240. [Online]. Available: http://doi.acm.org/10.1145/581339.581370 (Pubitemid 35009113)
    • (2002) Proceedings - International Conference on Software Engineering , pp. 232-240
    • Butler, S.A.1
  • 17
    • 47849092849 scopus 로고    scopus 로고
    • Making cost effective security decision with real option thinking
    • DC, USA: IEEE Computer Society Online
    • J. Li and X. Su, "Making cost effective security decision with real option thinking," in Proceedings of the International Conference on Software Engineering Advances. Washington, DC, USA: IEEE Computer Society, 2007, pp. 14-. [Online]. Available: http://portal.acm.org/citation.cfm?id=1304609. 1306415
    • (2007) Proceedings of the International Conference on Software Engineering Advances. Washington , pp. 14
    • Li, J.1    Su, X.2
  • 19
    • 78049344241 scopus 로고    scopus 로고
    • Reviewing product line architectures: Experience report of atam in an automotive context
    • F. van der Linden, Ed. Springer Berlin / Heidelberg
    • S. Ferber, P. Heidl, and P. Lutz, "Reviewing product line architectures: Experience report of atam in an automotive context," in Software Product-Family Engineering, ser. Lecture Notes in Computer Science, F. van der Linden, Ed. Springer Berlin / Heidelberg, 2002, vol. 2290, pp. 194-197.
    • (2002) Software Product-family Engineering, ser. Lecture Notes in Computer Science , vol.2290 , pp. 194-197
    • Ferber, S.1    Heidl, P.2    Lutz, P.3
  • 22
    • 51849152394 scopus 로고    scopus 로고
    • Extending atam to assess product line architecture
    • CIT 2008. 8th IEEE International Conference on, jul.
    • T. Kim, I. Y. Ko, S. W. Kang, and D. H. Lee, "Extending atam to assess product line architecture," in Computer and Information Technology, 2008. CIT 2008. 8th IEEE International Conference on, jul. 2008, pp. 790-797.
    • (2008) Computer and Information Technology, 2008 , pp. 790-797
    • Kim, T.1    Ko, I.Y.2    Kang, S.W.3    Lee, D.H.4
  • 24
    • 33750552785 scopus 로고    scopus 로고
    • Extending the ATAM architecture evaluation to product line architectures
    • DOI 10.1109/WICSA.2005.33, 1620090, Proceedings - 5th Working IEEE/IFIP Conference on Software Architecture, WICSA 2005
    • F. Olumofin and V. Misic, "Extending the atam architecture evaluation to product line architectures," in Software Architecture, 2005. WICSA 2005. 5th Working IEEE/IFIP Conference on, 2005, pp. 45-56. (Pubitemid 46401925)
    • (2005) Proceedings - 5th Working IEEE/IFIP Conference on Software Architecture, WICSA 2005 , vol.2005 , pp. 45-56
    • Olumofin, F.G.1    Misic, V.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.