Abstract | ||
---|---|---|
This paper is an attempt to explain and understand what security architecture means and represents. A starting point was to include all elements of security architecture such as: network, host-based, applications, information, software, hardware, databases and physical elements. Any security architecture should also include principles and process laid out in this paper. Models to capture security architecture and an example are presented. Finally techniques used to capture and assess security architectures are mentioned. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1145/1400549.1400596 | Spring Simulation Multiconference |
Keywords | Field | DocType |
understanding security architecture,physical element,security architecture mean,security threats,security attacks,policy,security architecture | Security convergence,Applications architecture,Software engineering,Computer security,Computer science,Software security assurance,Distributed System Security Architecture,Sherwood Applied Business Security Architecture,Real-time computing,Security information and event management,Enterprise information security architecture,Computer security model | Conference |
ISBN | Citations | PageRank |
1-56555-319-5 | 3 | 0.47 |
References | Authors | |
7 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Suhair Hafez Amer | 1 | 5 | 1.92 |
John A. Hamilton , Jr | 2 | 35 | 8.12 |