P2P attack taxonomy and relationship analysis
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Knowledge based quality-driven architecture design and evaluation
Information and Software Technology
Towards micro architecture for security adaptation
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Towards an abstraction layer for security assurance measurements: (invited paper)
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Reasoning about policy noncompliance
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Software security in the model for service oriented architecture quality
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
Journal of Network and Computer Applications
NEW2AN'11/ruSMART'11 Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networking
Hi-index | 0.00 |
Pervasive communications and the rapid expansion of Internet trigger a myriad of concerns about trust and information security. Moreover, composing software from components and services, originating from diverse sources, without a thorough quality assurance practices may expose serious weaknesses that open up the systems for malicious attacks and misuse. In order to guarantee the security of the systems we need a uniform understanding about what security is and how to measure it. This paper introduces a taxonomy of information security, intended for the use of software architects of servicecentric systems. The security taxonomy extends our quality oriented architecting environment (QoAE)an integrated tool environment for defining quality ontologies, describing the quality properties of service architectures, and analyzing quality requirement satisfaction at the level of proposed architecture.