Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Pattern-oriented software architecture: a system of patterns
Pattern-oriented software architecture: a system of patterns
SAAM: a method for analyzing the properties of software architectures
ICSE '94 Proceedings of the 16th international conference on Software engineering
Experience with performing architecture tradeoff analysis
Proceedings of the 21st international conference on Software engineering
Design and use of software architectures: adopting and evolving a product-line approach
Design and use of software architectures: adopting and evolving a product-line approach
Designing enterprise applications with the J2EE platform
Designing enterprise applications with the J2EE platform
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
The Secured Enterprise: Protecting Your Information Assets
The Secured Enterprise: Protecting Your Information Assets
Digital Certificates: Applied Internet Security (with CD-ROM)
Digital Certificates: Applied Internet Security (with CD-ROM)
Beyond Software Architecture: Creating and Sustaining Winning Solutions
Beyond Software Architecture: Creating and Sustaining Winning Solutions
Identifying Quality-Requirement Conflicts
IEEE Software
Quality Attribute Design Primitives and the Attribute Driven Design Method
PFE '01 Revised Papers from the 4th International Workshop on Software Product-Family Engineering
Software Architecture in Practice
Software Architecture in Practice
Linking usability to software architecture patterns through general scenarios
Journal of Systems and Software - Special issue on: Software architecture - Engineering quality attributes
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Elaborating Security Requirements by Construction of Intentional Anti-Models
Proceedings of the 26th International Conference on Software Engineering
Mining Patterns to Support Software Architecture Evaluation
WICSA '04 Proceedings of the Fourth Working IEEE/IFIP Conference on Software Architecture
APSEC '04 Proceedings of the 11th Asia-Pacific Software Engineering Conference
Assessment of a framework for designing and evaluating security sensitive architecture
EASE'08 Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering
Hi-index | 0.03 |
Security is an important quality attribute required in many software intensive systems. However, software development methodologies do not provide sufficient support to address security related issues. Furthermore, the majority of the software designers do not have adequate expertise in the security domain. Thus, security is often treated as an add-on to the designed architecture. Such ad-hoc practices to deal with security issues can result in a system that is vulnerable to different types of attacks. The security community has discovered several security sensitive design patterns, which can be used to compose a security sensitive architecture. However, there is little awareness about the relationship between security and software architecture. Our research has identified several security patterns along with the properties that can be achieved through those patterns. This paper presents those patterns and properties in a framework that can provide appropriate support to address security related issues during architecture processes.