Abstract | ||
---|---|---|
Conventional enterprise application design methodologies emphasize performance, scalability, and development/maintenance costs. Often such applications deal with access to confidential data (e-commerce, health, etc.). A single flaw in the application may lead to a compromise, exposing computational resources and sensitive data, such as private information, trade secrets, etc. Traditionally, security for enterprise applications focused on prevention; however, recent experience demonstrates that exploitation of infrastructure, operating systems, libraries, frameworks, personnel, etc. are almost unavoidable. While prevention should certainly remain the first line of defense, system architects must also incorporate designs to enable breach containment and response. In this paper, we survey related research on software application design that targets isolation, where the compromise of a single module presents a knowable and scope-limited worst-case impact. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1007/978-981-13-1056-0_51 | Lecture Notes in Electrical Engineering |
Keywords | Field | DocType |
Compromise,Isolation,Security,Modularization,Survey | Confidentiality,Computer science,Systems design,Risk analysis (engineering),Software,Modular programming,Compromise,Private information retrieval,Containment,Scalability | Conference |
Volume | ISSN | Citations |
514 | 1876-1100 | 0 |
PageRank | References | Authors |
0.34 | 11 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tomás Cerný | 1 | 73 | 23.16 |
Michael J. Donahoo | 2 | 137 | 52.31 |