Title
A security-centric ring-based software architecture
Abstract
Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic warfare attacks. We propose applying this same model to the domain of software in order to create a security-centric ring-based software architecture. This architecture would provide a foundation for software systems that would be highly resistant to malicious software.
Year
Venue
Keywords
2007
SpringSim (3)
software system,enemy system,security control,layered structure,john warden,strategic warfare attack,security-centric ring-based software architecture,five-ring model,software architecture,malicious software,software systems,computer security
Field
DocType
ISBN
Software engineering,Computer security,Simulation,Software security assurance,Computer science,Multilayered architecture,Software architecture description,Software system,Reference architecture,Component-based software engineering,Resource-oriented architecture,Software construction
Conference
1-56555-314-4
Citations 
PageRank 
References 
0
0.34
6
Authors
2
Name
Order
Citations
PageRank
Jay-Evan J. Tevis1141.75
John A. Hamilton , Jr2358.12