Correct Architecture Refinement
IEEE Transactions on Software Engineering - Special issue on software architecture
A General Theory of Composition for a Class of "Possibilistic" Properties
IEEE Transactions on Software Engineering
Style-based refinement for software architecture
ISAW '96 Joint proceedings of the second international software architecture workshop (ISAW-2) and international workshop on multiple perspectives in software development (Viewpoints '96) on SIGSOFT '96 workshops
A Classification and Comparison Framework for Software Architecture Description Languages
IEEE Transactions on Software Engineering
A framework for building non-functional software architectures
Proceedings of the 2001 ACM symposium on Applied computing
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
Incorporating Non-functional Requirements into Software Architectures
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
An approach to building quality into software architecture
CASCON '95 Proceedings of the 1995 conference of the Centre for Advanced Studies on Collaborative research
Enabling Iterative Software Architecture Derivation Using Early Non-Functional Property Evaluation
Proceedings of the 17th IEEE international conference on Automated software engineering
Putting non-functional requirements into software architecture
IWSSD '98 Proceedings of the 9th international workshop on Software specification and design
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
On the composition of security properties
On the composition of security properties
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
Non-Functional Refinement of Computer Based Systems Architecture
ECBS '04 Proceedings of the 11th IEEE International Conference and Workshop on Engineering of Computer-Based Systems
Leveraging architectural models to inject trust into software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Security policy refinement and enforcement for the design of multi-level secure systems
Journal of Computer Security - Privacy, Security and Trust (PST) Technologies: Evolution and Challenges
Architectural Refinement and Notions of Intransitive Noninterference
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Design, Implementation and Verification of MILS Systems
Software—Practice & Experience
Hi-index | 0.00 |
The successful design and implementation of secure systems must occur from the beginning. A component that must process data at multiple security levels is very critical and must go through additional evaluation to ensure the processing is secure. It is common practice to isolate and separate the processing of data at different levels into different components. In this paper we present architecture-based refinement techniques for the design of multilevel secure systems. We discuss what security requirements must be satisfied through the refinement process, including when separation works and when it does not. The process oriented approach will lead to verified engineering techniques for secure systems, which should greatly reduce the cost of certification of those systems.