Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Computer Networks
A Field Guide to Boxology: Preliminary Classification of Architectural Styles for Software Systems
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Information Security: Science, Pseudoscience, and Flying Pigs
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Sub-operating systems: a new approach to application security
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Hi-index | 0.00 |
Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic warfare attacks. We propose applying this same model to the domain of software in order to create a security-centric ring-based software architecture. This architecture would provide a foundation for software systems that would be highly resistant to malicious software.