Security Modeling with Palladio—Different Approaches
dc.contributor.author | Hilbrich, Marcus | |
dc.contributor.author | Frank, Markus | |
dc.contributor.author | Lehrig, Sebastian | |
dc.date.accessioned | 2023-03-02T13:44:27Z | |
dc.date.available | 2023-03-02T13:44:27Z | |
dc.date.issued | 2016 | |
dc.description.abstract | Security is never perfect, security deals with a lot of uncertainty, and security is complex. Nevertheless, security is one of the non-functional properties, that we, as software architects, have to consider. It is needed to include security in many trade-off decisions (usability, performance, costs, etc. versus security), to compare the security of different architectures, and to check whether legal constraints are meet. Thus it is demanded to include security modeling to approaches like Palladio. In this paper, we describe two approaches to model and analyze security using Palladio. The first approach is an external one and requires to adapt Palladio. The second approach is proposed by us and does not need to modify Palladio. Furthermore, we explain why we needed to develop a new approach based on a use case and its demanded pragmatism for the model. | en |
dc.identifier.pissn | 0720-8928 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/40635 | |
dc.language.iso | en | |
dc.publisher | Geselllschaft für Informatik e.V. | |
dc.relation.ispartof | Softwaretechnik-Trends Band 36, Heft 4 | |
dc.title | Security Modeling with Palladio—Different Approaches | en |
dc.type | Text/Journal Article | |
gi.citation.publisherPlace | Bonn | |
gi.conference.sessiontitle | Sonderteil: Proceedings of the Symposium on Software Performance (SSP 2016), 8. - 9. November 2016, Kiel |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- 13-Security_Modeling_with_Palladio_-_Different_Approaches.pdf
- Größe:
- 257.89 KB
- Format:
- Adobe Portable Document Format