Security principles like least privilege and attack surface reduction play an important role in the architectural phase of security engineering processes. However, the interplay between these principles and the side effects of the application of these secure design strategies on architectural qualities like maintainability have not been studied so far. Therefore it is hard to make informed trade-off decisions between security principles and between security and other qualities. This paper tackles this problem from a quantitative perspective by presenting the experimental results in the context of three case studies.status: publishe
Security analysis methods can provide correct yet meaningless results if the assumptions underlying ...
There are many facets of managing security in information systems. Although there are prior studies ...
© Springer International Publishing Switzerland 2014. Over the past three years, our groups at the U...
Due to the lack of both precise definitions and effective software engineering methodologies, securi...
Secure development processes integrate security-related concerns into the software development life-...
Security principles, like least privilege, are among the resources in the security body of knowledge...
Security principles are often neglected by software architects, due to the lack of precise definitio...
Supporting security principles, like least privilege, in a software architecture is difficult due to...
Security principles, like least privilege, are among the resources in the body of knowledge for secu...
The feedback from architectural decisions to the elaboration of requirements is an established conce...
The feedback from architectural decisions to the elaboration of requirements is an established conce...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Nowadays, evaluation of software security, as one of the important quality attributes, is of paramou...
This paper addresses the challenge of measuring security, understood as a system property, of cyberp...
Abstract- In today's advance technology, security problems become more important. Security meas...
Security analysis methods can provide correct yet meaningless results if the assumptions underlying ...
There are many facets of managing security in information systems. Although there are prior studies ...
© Springer International Publishing Switzerland 2014. Over the past three years, our groups at the U...
Due to the lack of both precise definitions and effective software engineering methodologies, securi...
Secure development processes integrate security-related concerns into the software development life-...
Security principles, like least privilege, are among the resources in the security body of knowledge...
Security principles are often neglected by software architects, due to the lack of precise definitio...
Supporting security principles, like least privilege, in a software architecture is difficult due to...
Security principles, like least privilege, are among the resources in the body of knowledge for secu...
The feedback from architectural decisions to the elaboration of requirements is an established conce...
The feedback from architectural decisions to the elaboration of requirements is an established conce...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Nowadays, evaluation of software security, as one of the important quality attributes, is of paramou...
This paper addresses the challenge of measuring security, understood as a system property, of cyberp...
Abstract- In today's advance technology, security problems become more important. Security meas...
Security analysis methods can provide correct yet meaningless results if the assumptions underlying ...
There are many facets of managing security in information systems. Although there are prior studies ...
© Springer International Publishing Switzerland 2014. Over the past three years, our groups at the U...