A security-centric ring-based software architecture

  • Authors:
  • Jay-Evan J. Tevis;John A. Hamilton, Jr.

  • Affiliations:
  • Western Illinois University, Macomb, IL;Auburn University, Auburn, Alabama

  • Venue:
  • SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic warfare attacks. We propose applying this same model to the domain of software in order to create a security-centric ring-based software architecture. This architecture would provide a foundation for software systems that would be highly resistant to malicious software.