Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
A survey on software architecture analysis methods
IEEE Transactions on Software Engineering
Architecture Level Prediction of Software Maintenance
CSMR '99 Proceedings of the Third European Conference on Software Maintenance and Reengineering
Threat Modeling
Using Security Patterns to Combine Security Metrics
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
HASE '08 Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
SAVE: Software Architecture Visualization and Evaluation
CSMR '09 Proceedings of the 2009 European Conference on Software Maintenance and Reengineering
Open Source Soa
Security Metrics for Object-Oriented Class Designs
QSIC '09 Proceedings of the 2009 Ninth International Conference on Quality Software
Security Evaluation of Service-Oriented Systems Using the SiSOA Method
International Journal of Secure Software Engineering
Automated software architecture security risk analysis using formalized signatures
Proceedings of the 2013 International Conference on Software Engineering
Hi-index | 0.00 |
The Service-Oriented Architecture paradigm (SOA) is commonly applied for the implementation of complex, distributed business processes. The service-oriented approach promises higher flexibility, interoperability and reusability of the IT infrastructure. However, evaluating the quality attribute security of large and complex SOA configurations is not sufficiently mastered yet. To tackle this complex problem, we developed a method for evaluating the security of existing service-oriented systems on the architectural level. The method is based on recovering security-relevant facts about the system by using reverse engineering techniques and subsequently providing automated support for further interactive security analysis at the structural level. By using generic, system-independent indicators and a knowledge base, the method is not limited to a specific programming language or technology. Therefore, we are able to apply the method to various systems and adapt it to specific evaluation needs. The paper describes the general structure of the method, and presents an instantiation aligned to the Service Component Architecture (SCA) specification.