Sciweavers

Share
COMPSAC
2010
IEEE

Security in Context: Analysis and Refinement of Software Architectures

10 years 10 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the security of software-intensive system architectures that focusses on making these underlying assumptions explicit, so that they can be taken into account. Starting from an Alloy model of a software architecture, a set of constraints is elicited by leveraging model relaxation techniques. These constraints form a minimal but sufficient condition that the system must meet in order to realise its security requirements. As the approach starts from the minimal guarantees that the system environment offers, it does not depend on an explicit attacker model and can take arbitrary attacker behaviour into account. As it is iterative, it is possible to constructively integrate the approach in a secure software development life cycle. Our results are illustrated by means of a case study. Keywords-security; software architectur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
Added 21 Mar 2011
Updated 21 Mar 2011
Type Journal
Year 2010
Where COMPSAC
Authors Thomas Heyman, Riccardo Scandariato, Wouter Joosen
Comments (0)
books