DC FieldValueLanguage
dc.contributor.authorBuyens, Koen-
dc.contributor.authorScandariato, Riccardo-
dc.contributor.authorJoosen, Wouter-
dc.date.accessioned2023-03-10T12:53:42Z-
dc.date.available2023-03-10T12:53:42Z-
dc.date.issued2009-10-
dc.identifier.citation3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009: 5315968, 554-563 (2009-12-28)de_DE
dc.identifier.isbn978-1-4244-4842-5de_DE
dc.identifier.urihttp://hdl.handle.net/11420/14988-
dc.description.abstractSecurity principles like least privilege and attack surface reduction play an important role in the architectural phase of security engineering processes. However, the interplay between these principles and the side effects of the application of these secure design strategies on architectural qualities like maintainability have not been studied so far. Therefore it is hard to make informed trade-off decisions between security principles and between security and other qualities. This paper tackles this problem from a quantitative perspective by presenting the experimental results in the context of three case studies.en
dc.language.isoende_DE
dc.publisherIEEEde_DE
dc.subject.ddc004: Informatikde_DE
dc.titleMeasuring the interplay of security principles in software architecturesde_DE
dc.typeinProceedingsde_DE
dc.type.dinicontributionToPeriodical-
dcterms.DCMITypeText-
tuhh.abstract.englishSecurity principles like least privilege and attack surface reduction play an important role in the architectural phase of security engineering processes. However, the interplay between these principles and the side effects of the application of these secure design strategies on architectural qualities like maintainability have not been studied so far. Therefore it is hard to make informed trade-off decisions between security principles and between security and other qualities. This paper tackles this problem from a quantitative perspective by presenting the experimental results in the context of three case studies.de_DE
tuhh.publisher.doi10.1109/ESEM.2009.5315968-
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.drivercontributionToPeriodical-
dc.type.casraiConference Paper-
tuhh.container.startpage554de_DE
tuhh.container.endpage563de_DE
dc.relation.conference3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009de_DE
dc.identifier.scopus2-s2.0-72449210147de_DE
tuhh.container.articlenumber5315968de_DE
local.status.inpressfalsede_DE
datacite.resourceTypeGeneralConferencePaper-
item.grantfulltextnone-
item.creatorGNDBuyens, Koen-
item.creatorGNDScandariato, Riccardo-
item.creatorGNDJoosen, Wouter-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.openairetypeinProceedings-
item.mappedtypeinProceedings-
item.creatorOrcidBuyens, Koen-
item.creatorOrcidScandariato, Riccardo-
item.creatorOrcidJoosen, Wouter-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
crisitem.author.deptSoftware Security E-22-
crisitem.author.orcid0000-0003-3591-7671-
crisitem.author.parentorgStudiendekanat Elektrotechnik, Informatik und Mathematik (E)-
Appears in Collections:Publications without fulltext
Show simple item record

Google ScholarTM

Check

Add Files to Item

Note about this record

Cite this record

Export

Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.