Role-Based Access Control Models
Computer
Dynamic structure in software architectures
SIGSOFT '96 Proceedings of the 4th ACM SIGSOFT symposium on Foundations of software engineering
A formal basis for architectural connection
ACM Transactions on Software Engineering and Methodology (TOSEM)
Executable connectors: towards reusable design elements
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
A Classification and Comparison Framework for Software Architecture Description Languages
IEEE Transactions on Software Engineering
Towards a taxonomy of software connectors
Proceedings of the 22nd international conference on Software engineering
A note on the confinement problem
Communications of the ACM
Avoiding Packaging Mismatch with Flexible Packaging
IEEE Transactions on Software Engineering - Special issue on 1999 international conference on software engineering
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Communications of the ACM
An infrastructure for the rapid development of XML-based architecture description languages
Proceedings of the 24th International Conference on Software Engineering
Architectural views of aspects
Proceedings of the 2nd international conference on Aspect-oriented software development
Security Benefits from Software Architecture
COORDINATION '97 Proceedings of the Second International Conference on Coordination Languages and Models
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Architectural Reflection: Realising Software Architectures via Reflective Activities
EDO '00 Revised Papers from the Second International Workshop on Engineering Distributed Objects
A Compositional Approach for Constructing Connectors
WICSA '01 Proceedings of the Working IEEE/IFIP Conference on Software Architecture
Higher-order architectural connectors
ACM Transactions on Software Engineering and Methodology (TOSEM)
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
The design of a configurable, extensible and dynamic notification service
Proceedings of the 2nd international workshop on Distributed event-based systems
The J2EE Tutorial, Second Edition
The J2EE Tutorial, Second Edition
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
A Call to Action: Look Beyond the Horizon
IEEE Security and Privacy
An introduction to trust negotiation
iTrust'03 Proceedings of the 1st international conference on Trust management
Science of Computer Programming
Hi-index | 0.00 |
Security is a very important concern for software architecture and software components. Previous modeling approaches provide insufficient support for an in-depth treatment of security. This paper argues for a more comprehensive treatment based on software connectors. Connectors provide a suitable vehicle to model, capture, and enforce security. Our approach models security principal, privilege, trust, and context of architectural constituents. Extending our existing architecture description language and support tools, our approach can facilitate describing the security characteristics of an architecture generating enabling infrastructure, and monitoring run-time conformance. Initial results of applying this approach are illustrated through a case study. The contribution of this research is a deeper and more comprehensive treatment of architectural security through software connectors.