Proceedings of the Fourth European Conference on Software Architecture: Companion Volume 2010
DOI: 10.1145/1842752.1842795
|View full text |Cite
|
Sign up to set email alerts
|

Indicator-based architecture-level security evaluation in a service-oriented environment

Abstract: The Service-Oriented Architecture paradigm (SOA) is commonly applied for the implementation of complex, distributed business processes. The service-oriented approach promises higher flexibility, interoperability and reusability of the IT infrastructure. However, evaluating the quality attribute security of large and complex SOA configurations is not sufficiently mastered yet. To tackle this complex problem, we developed a method for evaluating the security of existing service-oriented systems on the architectu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…One of the studies in this field is by Antonino et al [42] who define an evaluation technique for measuring the security of an existing service-oriented architecture. This evaluation technique is based on two types of metrics: severity and credibility.…”
Section: A Software Security Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the studies in this field is by Antonino et al [42] who define an evaluation technique for measuring the security of an existing service-oriented architecture. This evaluation technique is based on two types of metrics: severity and credibility.…”
Section: A Software Security Metricsmentioning
confidence: 99%
“…This evaluation technique is based on two types of metrics: severity and credibility. Severity relates to the value of tagged security artifacts while credibility is the probability of correctly assigning a tag to its relevant system component [42].Further work in this area was conducted by Liu et al who proposed a model called the "User System Interaction Effect (USIE)" [43]. The USIE model is responsible for providing a systematic approach to identify security defects from the architecture of a service-oriented system [43].…”
mentioning
confidence: 99%
“…This evaluation technique is based on two types of metrics: severity and credibility. Severity relates to the value of tagged security artifacts while credibility is the probability of correctly assigning a tag to its relevant system component [12].…”
Section: Related Workmentioning
confidence: 99%
“…One of the studies in this field is by Antonino et al [12] who define an evaluation technique for measuring the security of an existing service-oriented architecture. This evaluation technique is based on two types of metrics: severity and credibility.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation