2011 Ninth Working IEEE/IFIP Conference on Software Architecture 2011
DOI: 10.1109/wicsa.2011.25
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Security Properties of Architectures in Unpredictable Environments: A Case for Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…It provides a well structured procedure to evaluate an architecture's fitness taking into account a set of non-dominant quality attributes (in the sense that improving one attribute will implicitly worsen another). ATAM has been successfully used for analysing software architectures in cloud computing [30], with a special focus on the security aspect [13], for investigating the design of service-oriented systems for serious games [8] as well as a starting point for bespoke approaches considering the impact of uncertainty on software requirements and architectures [29], the importance of enterprise information systems availability [33] or the sustainability of software architectures [50]. When applied to the Aviator domain, ATAM enabled the identification and management of the following factors.…”
Section: Aviator Architecture Evaluationmentioning
confidence: 99%
“…It provides a well structured procedure to evaluate an architecture's fitness taking into account a set of non-dominant quality attributes (in the sense that improving one attribute will implicitly worsen another). ATAM has been successfully used for analysing software architectures in cloud computing [30], with a special focus on the security aspect [13], for investigating the design of service-oriented systems for serious games [8] as well as a starting point for bespoke approaches considering the impact of uncertainty on software requirements and architectures [29], the importance of enterprise information systems availability [33] or the sustainability of software architectures [50]. When applied to the Aviator domain, ATAM enabled the identification and management of the following factors.…”
Section: Aviator Architecture Evaluationmentioning
confidence: 99%
“…An example of a design vulnerability from a recent case study [53] allowed ciphered text to be accessible to the user to provide a sense of data security. This was identified to be a major design vulnerability, as it permits the user to cryptanalyse the ciphered text to identify the cryptographic key used during encryption.…”
Section: Chapter 3 Requirements For Security Testing 33 Design-spementioning
confidence: 99%
“…The application also aimed at soliciting an unbiased view of the approach's potential when applied by a industrial-party architecture team (comprised of two senior architects, an MSC student and 2 developers). The results of this stage were published in [53]. We built on the results of the first stage to evaluate the adaptivity of an IS approach in which we added more functionality.…”
Section: Case Study 2: Cloud Applicationmentioning
confidence: 99%
See 2 more Smart Citations