skip to main content
research-article

Architectural Analysis for Security

Published: 01 November 2015 Publication History

Abstract

Existing research on systems security has focused on coding, providing little insight into how to create a secure architecture. Combining architectural analysis techniques based on tactics, patterns, and vulnerabilities will achieve the best outcomes.

References

[1]
D. Falessi et al., “Decision-Making Techniques for Software Architecture Design: A Comparative Survey,” ACM Computing Surveys, vol. 43, no. 4, 2011, pp. 33:1–33:28.
[2]
S. T. Halkidis et al., “Architectural Risk Analysis of Software Systems Based on Security Patterns,” IEEE Trans. Dependable and Secure Computing, vol. 5, no. 3, 2008, pp. 129–142.
[3]
E. B. Fernandez, “A Methodology for Secure Software Design,” in Proc. 2004 Int'l Conf. Software Engineering Research and Practice (SERP 04), 2004, pp. 130–136.
[4]
M. Hafiz, P. Adamczyk, and R. E. Johnson, “Organizing Security Patterns,” IEEE Software, vol. 24, no. 4, 2007, pp. 52–60.
[5]
P. Manadhata and J. Wing, “An Attack Surface Metric,” IEEE Trans Software Eng., vol. 37, no. 3. 2011, pp. 371–386.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 13, Issue 6
Nov.-Dec. 2015
94 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 November 2015

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media