DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heyman, Tom | - |
dc.contributor.author | Scandariato, Riccardo | - |
dc.contributor.author | Joosen, Wouter | - |
dc.date.accessioned | 2023-03-10T13:04:07Z | - |
dc.date.available | 2023-03-10T13:04:07Z | - |
dc.date.issued | 2009-03 | - |
dc.identifier.citation | Proceedings - International Conference on Availability, Reliability and Security, ARES 2009: 5066495, 363-368 (2009-10-12) | de_DE |
dc.identifier.isbn | 978-1-4244-3572-2 | de_DE |
dc.identifier.uri | http://hdl.handle.net/11420/14989 | - |
dc.description.abstract | Architectural modelling and risk management are invaluable to increase the security of a software system. The purpose of this work is to show how both approaches can be integrated in a risk-aware architectural modelling technique. As the modelling is formal, the approach offers stronger guarantees that the resulting architecture achieves its security requirements. | en |
dc.language.iso | en | de_DE |
dc.publisher | IEEE | de_DE |
dc.subject.ddc | 004: Informatik | de_DE |
dc.title | Risk-driven architectural decomposition | de_DE |
dc.type | inProceedings | de_DE |
dc.type.dini | contributionToPeriodical | - |
dcterms.DCMIType | Text | - |
tuhh.abstract.english | Architectural modelling and risk management are invaluable to increase the security of a software system. The purpose of this work is to show how both approaches can be integrated in a risk-aware architectural modelling technique. As the modelling is formal, the approach offers stronger guarantees that the resulting architecture achieves its security requirements. | de_DE |
tuhh.publisher.doi | 10.1109/ARES.2009.32 | - |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.casrai | Conference Paper | - |
tuhh.container.startpage | 363 | de_DE |
tuhh.container.endpage | 368 | de_DE |
dc.relation.conference | International Conference on Availability, Reliability and Security, ARES 2009 | de_DE |
dc.identifier.scopus | 2-s2.0-70349679293 | de_DE |
tuhh.container.articlenumber | 5066495 | de_DE |
local.status.inpress | false | de_DE |
datacite.resourceTypeGeneral | ConferencePaper | - |
item.grantfulltext | none | - |
item.creatorGND | Heyman, Tom | - |
item.creatorGND | Scandariato, Riccardo | - |
item.creatorGND | Joosen, Wouter | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.openairetype | inProceedings | - |
item.mappedtype | inProceedings | - |
item.creatorOrcid | Heyman, Tom | - |
item.creatorOrcid | Scandariato, Riccardo | - |
item.creatorOrcid | Joosen, Wouter | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
crisitem.author.dept | Software Security E-22 | - |
crisitem.author.orcid | 0000-0003-0565-441X | - |
crisitem.author.orcid | 0000-0003-3591-7671 | - |
crisitem.author.parentorg | Studiendekanat Elektrotechnik, Informatik und Mathematik (E) | - |
Appears in Collections: | Publications without fulltext |
Google ScholarTM
Check
Add Files to Item
Note about this record
Cite this record
Export
Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.