Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
A security architecture for the Internet protocol
IBM Systems Journal
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Security in Computing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Principles of Information Security
Principles of Information Security
The flask security architecture: system support for diverse security policies
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Suggested improvements to the DoDAF for modeling architectural security
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Information assurance modeling using the Department of Defense architecture framework
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Hi-index | 0.01 |
This paper is an attempt to explain and understand what security architecture means and represents. A starting point was to include all elements of security architecture such as: network, host-based, applications, information, software, hardware, databases and physical elements. Any security architecture should also include principles and process laid out in this paper. Models to capture security architecture and an example are presented. Finally techniques used to capture and assess security architectures are mentioned.