DC Field | Value | Language |
---|---|---|
dc.contributor.author | Buyens, Koen | - |
dc.contributor.author | Scandariato, Riccardo | - |
dc.contributor.author | Joosen, Wouter | - |
dc.date.accessioned | 2023-03-10T12:53:42Z | - |
dc.date.available | 2023-03-10T12:53:42Z | - |
dc.date.issued | 2009-10 | - |
dc.identifier.citation | 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009: 5315968, 554-563 (2009-12-28) | de_DE |
dc.identifier.isbn | 978-1-4244-4842-5 | de_DE |
dc.identifier.uri | http://hdl.handle.net/11420/14988 | - |
dc.description.abstract | Security principles like least privilege and attack surface reduction play an important role in the architectural phase of security engineering processes. However, the interplay between these principles and the side effects of the application of these secure design strategies on architectural qualities like maintainability have not been studied so far. Therefore it is hard to make informed trade-off decisions between security principles and between security and other qualities. This paper tackles this problem from a quantitative perspective by presenting the experimental results in the context of three case studies. | en |
dc.language.iso | en | de_DE |
dc.publisher | IEEE | de_DE |
dc.subject.ddc | 004: Informatik | de_DE |
dc.title | Measuring the interplay of security principles in software architectures | de_DE |
dc.type | inProceedings | de_DE |
dc.type.dini | contributionToPeriodical | - |
dcterms.DCMIType | Text | - |
tuhh.abstract.english | Security principles like least privilege and attack surface reduction play an important role in the architectural phase of security engineering processes. However, the interplay between these principles and the side effects of the application of these secure design strategies on architectural qualities like maintainability have not been studied so far. Therefore it is hard to make informed trade-off decisions between security principles and between security and other qualities. This paper tackles this problem from a quantitative perspective by presenting the experimental results in the context of three case studies. | de_DE |
tuhh.publisher.doi | 10.1109/ESEM.2009.5315968 | - |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.casrai | Conference Paper | - |
tuhh.container.startpage | 554 | de_DE |
tuhh.container.endpage | 563 | de_DE |
dc.relation.conference | 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009 | de_DE |
dc.identifier.scopus | 2-s2.0-72449210147 | de_DE |
tuhh.container.articlenumber | 5315968 | de_DE |
local.status.inpress | false | de_DE |
datacite.resourceTypeGeneral | ConferencePaper | - |
item.grantfulltext | none | - |
item.creatorGND | Buyens, Koen | - |
item.creatorGND | Scandariato, Riccardo | - |
item.creatorGND | Joosen, Wouter | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.openairetype | inProceedings | - |
item.mappedtype | inProceedings | - |
item.creatorOrcid | Buyens, Koen | - |
item.creatorOrcid | Scandariato, Riccardo | - |
item.creatorOrcid | Joosen, Wouter | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
crisitem.author.dept | Software Security E-22 | - |
crisitem.author.orcid | 0000-0003-3591-7671 | - |
crisitem.author.parentorg | Studiendekanat Elektrotechnik, Informatik und Mathematik (E) | - |
Appears in Collections: | Publications without fulltext |
Google ScholarTM
Check
Add Files to Item
Note about this record
Cite this record
Export
Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.