Title: The security twin peaks
Authors: Heyman, Thomas
Yskout, Koen
Scandariato, Riccardo
Schmidt, Holger
Yu, Yijun
Issue Date: Feb-2011
Host Document: ENGINEERING SECURE SOFTWARE AND SYSTEMS vol:6542 pages:167-180
Conference: International Symposium on Engineering Secure Software and Systems edition:2 location:Madrid, Spain date:9-10 February, 2011
Abstract: The feedback from architectural decisions to the elaboration
of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.
ISBN: 978-3-642-19124-4
ISSN: 0302-9743
Publication status: published
KU Leuven publication type: IC
Appears in Collections:Informatics Section

Files in This Item:
File Description Status SizeFormat
paper.pdfMain article Accepted 294KbAdobe PDFView/Open


All items in Lirias are protected by copyright, with all rights reserved.

© Web of science