Logo des Repositoriums
 

Security Modeling with Palladio—Different Approaches

dc.contributor.authorHilbrich, Marcus
dc.contributor.authorFrank, Markus
dc.contributor.authorLehrig, Sebastian
dc.date.accessioned2023-03-02T13:44:27Z
dc.date.available2023-03-02T13:44:27Z
dc.date.issued2016
dc.description.abstractSecurity is never perfect, security deals with a lot of uncertainty, and security is complex. Nevertheless, security is one of the non-functional properties, that we, as software architects, have to consider. It is needed to include security in many trade-off decisions (usability, performance, costs, etc. versus security), to compare the security of different architectures, and to check whether legal constraints are meet. Thus it is demanded to include security modeling to approaches like Palladio. In this paper, we describe two approaches to model and analyze security using Palladio. The first approach is an external one and requires to adapt Palladio. The second approach is proposed by us and does not need to modify Palladio. Furthermore, we explain why we needed to develop a new approach based on a use case and its demanded pragmatism for the model.en
dc.identifier.pissn0720-8928
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/40635
dc.language.isoen
dc.publisherGeselllschaft für Informatik e.V.
dc.relation.ispartofSoftwaretechnik-Trends Band 36, Heft 4
dc.titleSecurity Modeling with Palladio—Different Approachesen
dc.typeText/Journal Article
gi.citation.publisherPlaceBonn
gi.conference.sessiontitleSonderteil: Proceedings of the Symposium on Software Performance (SSP 2016), 8. - 9. November 2016, Kiel

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
13-Security_Modeling_with_Palladio_-_Different_Approaches.pdf
Größe:
257.89 KB
Format:
Adobe Portable Document Format