Code complete: a practical handbook of software construction
Code complete: a practical handbook of software construction
Software architecture in practice
Software architecture in practice
Scheduling and memory requirements analysis with AADL
Proceedings of the 2005 annual ACM SIGAda international conference on Ada: The Engineering of Correct and Reliable Software for Real-Time & Distributed Systems using Ada and Related Technologies
From the prototype to the final embedded system using the Ocarina AADL tool suite
ACM Transactions on Embedded Computing Systems (TECS)
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Reasoning about policy noncompliance
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Evaluating confidence levels for security scenarios in attribute architectures
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
Determining whether a software architecture meets its security requirements is an early step in assuring the security of the products developed from the architecture. In this paper, we propose a tool-based technique using an authorization scheme to analyze the security of software architectures. Such technique will serve as debugging support for software architectures to identify the portion in the software architecture that fails to meet the required level. Security is analyzed in terms of its aggregate attributes: availability, confidentiality, and integrity. In this paper, we address confidentiality and show that integrity is measured in a complementary manner to confidentiality. A scenario based approach is taken to analyze security in a software architecture. Our work is implemented in the OSATE environment and analyzes software architectures modeled using AADL (Architecture Analysis and Design Language).