DC FieldValueLanguage
dc.contributor.authorHeyman, Tom-
dc.contributor.authorScandariato, Riccardo-
dc.contributor.authorJoosen, Wouter-
dc.date.accessioned2023-03-10T13:04:07Z-
dc.date.available2023-03-10T13:04:07Z-
dc.date.issued2009-03-
dc.identifier.citationProceedings - International Conference on Availability, Reliability and Security, ARES 2009: 5066495, 363-368 (2009-10-12)de_DE
dc.identifier.isbn978-1-4244-3572-2de_DE
dc.identifier.urihttp://hdl.handle.net/11420/14989-
dc.description.abstractArchitectural modelling and risk management are invaluable to increase the security of a software system. The purpose of this work is to show how both approaches can be integrated in a risk-aware architectural modelling technique. As the modelling is formal, the approach offers stronger guarantees that the resulting architecture achieves its security requirements.en
dc.language.isoende_DE
dc.publisherIEEEde_DE
dc.subject.ddc004: Informatikde_DE
dc.titleRisk-driven architectural decompositionde_DE
dc.typeinProceedingsde_DE
dc.type.dinicontributionToPeriodical-
dcterms.DCMITypeText-
tuhh.abstract.englishArchitectural modelling and risk management are invaluable to increase the security of a software system. The purpose of this work is to show how both approaches can be integrated in a risk-aware architectural modelling technique. As the modelling is formal, the approach offers stronger guarantees that the resulting architecture achieves its security requirements.de_DE
tuhh.publisher.doi10.1109/ARES.2009.32-
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.drivercontributionToPeriodical-
dc.type.casraiConference Paper-
tuhh.container.startpage363de_DE
tuhh.container.endpage368de_DE
dc.relation.conferenceInternational Conference on Availability, Reliability and Security, ARES 2009de_DE
dc.identifier.scopus2-s2.0-70349679293de_DE
tuhh.container.articlenumber5066495de_DE
local.status.inpressfalsede_DE
datacite.resourceTypeGeneralConferencePaper-
item.grantfulltextnone-
item.creatorGNDHeyman, Tom-
item.creatorGNDScandariato, Riccardo-
item.creatorGNDJoosen, Wouter-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.openairetypeinProceedings-
item.mappedtypeinProceedings-
item.creatorOrcidHeyman, Tom-
item.creatorOrcidScandariato, Riccardo-
item.creatorOrcidJoosen, Wouter-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
crisitem.author.deptSoftware Security E-22-
crisitem.author.orcid0000-0003-0565-441X-
crisitem.author.orcid0000-0003-3591-7671-
crisitem.author.parentorgStudiendekanat Elektrotechnik, Informatik und Mathematik (E)-
Appears in Collections:Publications without fulltext
Show simple item record

Google ScholarTM

Check

Add Files to Item

Note about this record

Cite this record

Export

Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.