Abstract | ||
---|---|---|
Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic warfare attacks. We propose applying this same model to the domain of software in order to create a security-centric ring-based software architecture. This architecture would provide a foundation for software systems that would be highly resistant to malicious software. |
Year | Venue | Keywords |
---|---|---|
2007 | SpringSim (3) | software system,enemy system,security control,layered structure,john warden,strategic warfare attack,security-centric ring-based software architecture,five-ring model,software architecture,malicious software,software systems,computer security |
Field | DocType | ISBN |
Software engineering,Computer security,Simulation,Software security assurance,Computer science,Multilayered architecture,Software architecture description,Software system,Reference architecture,Component-based software engineering,Resource-oriented architecture,Software construction | Conference | 1-56555-314-4 |
Citations | PageRank | References |
0 | 0.34 | 6 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jay-Evan J. Tevis | 1 | 14 | 1.75 |
John A. Hamilton , Jr | 2 | 35 | 8.12 |