Title
Survey on Compromise-Defensive System Design.
Abstract
Conventional enterprise application design methodologies emphasize performance, scalability, and development/maintenance costs. Often such applications deal with access to confidential data (e-commerce, health, etc.). A single flaw in the application may lead to a compromise, exposing computational resources and sensitive data, such as private information, trade secrets, etc. Traditionally, security for enterprise applications focused on prevention; however, recent experience demonstrates that exploitation of infrastructure, operating systems, libraries, frameworks, personnel, etc. are almost unavoidable. While prevention should certainly remain the first line of defense, system architects must also incorporate designs to enable breach containment and response. In this paper, we survey related research on software application design that targets isolation, where the compromise of a single module presents a knowable and scope-limited worst-case impact.
Year
DOI
Venue
2018
10.1007/978-981-13-1056-0_51
Lecture Notes in Electrical Engineering
Keywords
Field
DocType
Compromise,Isolation,Security,Modularization,Survey
Confidentiality,Computer science,Systems design,Risk analysis (engineering),Software,Modular programming,Compromise,Private information retrieval,Containment,Scalability
Conference
Volume
ISSN
Citations 
514
1876-1100
0
PageRank 
References 
Authors
0.34
11
2
Name
Order
Citations
PageRank
Tomás Cerný17323.16
Michael J. Donahoo213752.31