loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Stefanie Jasser 1 ; Katja Tuma 2 ; Riccardo Scandariato 2 and Matthias Riebisch 1

Affiliations: 1 Universität Hamburg, Germany ; 2 Chalmers and Gothenburg University, Sweden

Keyword(s): Software Architecture, Security by Design, Privacy by Design, Secure Software Architecture, Architecture Erosion, Architectural Decay, Architecture Violations, Architecture Conformance Checking, Architecture Compliance Checking, Security Constraints.

Abstract: Today, security is still poorly considered in early phases of software engineering. Architects and software engineers still lack knowledge about architectural security design as well as implementing it compliantly. However, a software system that is not designed for security or does not adhere to this design can hardly meet its security requirements. In this paper, we present an approach we are working on. The approach consists of two parts: Firstly, we improve the architecture’s security level through model transformation. Secondly, we derive rules and constraints from the secured architecture in order to check the implementation’s conformance. Through these activities we aim to support architects and software developers in building a secure software system. We plan to evaluate our approach in industrial case studies.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.223.210.76

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Jasser, S.; Tuma, K.; Scandariato, R. and Riebisch, M. (2018). Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process. In Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-282-0; ISSN 2184-4356, SciTePress, pages 438-446. DOI: 10.5220/0006659904380446

@conference{icissp18,
author={Stefanie Jasser. and Katja Tuma. and Riccardo Scandariato. and Matthias Riebisch.},
title={Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP},
year={2018},
pages={438-446},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006659904380446},
isbn={978-989-758-282-0},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP
TI - Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process
SN - 978-989-758-282-0
IS - 2184-4356
AU - Jasser, S.
AU - Tuma, K.
AU - Scandariato, R.
AU - Riebisch, M.
PY - 2018
SP - 438
EP - 446
DO - 10.5220/0006659904380446
PB - SciTePress