Sciweavers

ESSOS
2011
Springer

The Security Twin Peaks

13 years 4 months ago
The Security Twin Peaks
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of this feedback in a precise way is a largely open problem. Often, the feedback is generically characterized as additional qualities that might be affected by an architect’s choice. This paper provides a practical perspective on this problem by leveraging architectural security patterns. The contribution of this paper is the Security Twin Peaks model, which serves as an operational framework to co-develop security in the requirements and the architectural artifacts.
Thomas Heyman, Koen Yskout, Riccardo Scandariato,
Added 27 Aug 2011
Updated 27 Aug 2011
Type Journal
Year 2011
Where ESSOS
Authors Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu
Comments (0)