Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Software engineering (extended abstract): an unconsummated marriage
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
Software development as science, art, and engineering
The patterns handbooks
The high assurance brake job—a cautionary tale in five scenes
Proceedings of the 1999 workshop on New security paradigms
Computer programming as an art
Communications of the ACM
Adversary work factor as a metric for information assurance
Proceedings of the 2000 workshop on New security paradigms
Liability and Computer Security: Nine Principles
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Teaching Programming as Engineering
ZUM '95 Proceedings of the 9th International Conference of Z Usres on The Z Formal Specification Notation
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
A Symbiotic Relationship Between Formal Methods and Security
CSDA '98 Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions
Information Security: Science, Pseudoscience, and Flying Pigs
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Abuse-Case-Based Assurance Arguments
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Threat Modeling
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
A view of 20th and 21st century software engineering
Proceedings of the 28th international conference on Software engineering
Web Application Security Engineering
IEEE Security and Privacy
The Security Development Lifecycle
The Security Development Lifecycle
Secure Software Design in Practice
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A Brief History of Software Engineering
IEEE Annals of the History of Computing
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
Quantified security is a weak hypothesis: a critical survey of results and assumptions
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
A Survey of Vendor Software Assurance Practices
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Really Rethinking 'Formal Methods'
Computer
Beyond heuristics: learning to classify vulnerabilities and predict exploits
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Why is there no science in cyber science?: a panel discussion at NSPW 2010
Proceedings of the 2010 workshop on New security paradigms
Barriers to science in security
Proceedings of the 26th Annual Computer Security Applications Conference
Will software engineering ever be engineering?
Communications of the ACM
Proceedings of the 2011 workshop on New security paradigms workshop
ASIDE: IDE support for web application security
Proceedings of the 27th Annual Computer Security Applications Conference
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Automated tracing and visualization of software security structure and properties
Proceedings of the Ninth International Symposium on Visualization for Cyber Security
All your base are belong to US
Proceedings of the 2012 workshop on New security paradigms
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Security property degrees systematize the angles from which one can discuss the security of a system. Microscopic properties characterize how specific actions affect parts of a system. Mesoscopic properties describe how the pursuit of an attack objective may affect the system and the attacker. Macroscopic properties represent the interaction of a threat environment with a system. Properties of different degrees are interdependent, but not in a simple and universal manner. Security design aims to control security properties, shaping them in a favorable way. Its objective is macroscopic control through design decisions on all three degrees. Design tools today occupy mostly the lower half of the property degree scale. A few macroscopic design aids exist but provide little guidance to engineers. Security designers are thus in a similar situation as photographers, having to make fundamental design decisions without methodologies other than their private, homegrown approaches. This is essential for art but a deficiency in engineering. Standardized mechanization in point-and-shoot cameras helps inexpert photographers to a limited extent but can get in the way of the experienced and ambitious. Point-and-shoot security design, shorthand for current practice as well as a widely held expectation, may do the same to security engineers.