Architectural Approaches to Security: Four Case Studies

An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer (Long Beach, Calif.) Calif.), 2016-11, Vol.49 (11), p.60-67
Hauptverfasser: Cervantes, Humberto, Kazman, Rick, Jungwoo Ryoo, Duyoung Choi, Duksung Jang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 67
container_issue 11
container_start_page 60
container_title Computer (Long Beach, Calif.)
container_volume 49
creator Cervantes, Humberto
Kazman, Rick
Jungwoo Ryoo
Duyoung Choi
Duksung Jang
description An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.
doi_str_mv 10.1109/MC.2016.332
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_7742194</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7742194</ieee_id><sourcerecordid>4258832611</sourcerecordid><originalsourceid>FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</originalsourceid><addsrcrecordid>eNo9kE1LAzEURYMoWKsrl24GXMrU95JMk7grg1WhxUV1HWI-6JTq1CSz6L9vSsXV5cLhvcsh5BZhggjqcdlOKOB0whg9IyNsGlmDRH5ORgAoa4VTekmuUtqUymXDRkTMol132ds8RLOtZrtd7I1d-1Tlvlp5O8Qu75-qeT_EqjXJV6s8uM6na3IRzDb5m78ck8_580f7Wi_eX97a2aK2VGKuFQBYIREcbXigjoVm6tAIJiwqJpz6AuuDENQ6zwEaZYIUVrqAwXCnkI3J_elu2fU7-JT1pkz5KS81Sk6ZQsl4oR5OlI19StEHvYvdt4l7jaCPZvSy1Uczupgp9N2J7rz3_6QQnKLi7ADxjV0A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1842391834</pqid></control><display><type>article</type><title>Architectural Approaches to Security: Four Case Studies</title><source>IEEE Electronic Library (IEL)</source><creator>Cervantes, Humberto ; Kazman, Rick ; Jungwoo Ryoo ; Duyoung Choi ; Duksung Jang</creator><creatorcontrib>Cervantes, Humberto ; Kazman, Rick ; Jungwoo Ryoo ; Duyoung Choi ; Duksung Jang</creatorcontrib><description>An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.</description><identifier>ISSN: 0018-9162</identifier><identifier>EISSN: 1558-0814</identifier><identifier>DOI: 10.1109/MC.2016.332</identifier><identifier>CODEN: CPTRB4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>architectural design ; Computer architecture ; Cost benefit analysis ; countermeasures ; Encoding ; frameworks ; Java ; Maintenance costs ; Network security ; Open source software ; Open systems ; project cost ; Security ; security tactics ; Software architecture ; software architectures ; Software development</subject><ispartof>Computer (Long Beach, Calif.), 2016-11, Vol.49 (11), p.60-67</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nov 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</citedby><cites>FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7742194$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7742194$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cervantes, Humberto</creatorcontrib><creatorcontrib>Kazman, Rick</creatorcontrib><creatorcontrib>Jungwoo Ryoo</creatorcontrib><creatorcontrib>Duyoung Choi</creatorcontrib><creatorcontrib>Duksung Jang</creatorcontrib><title>Architectural Approaches to Security: Four Case Studies</title><title>Computer (Long Beach, Calif.)</title><addtitle>MC</addtitle><description>An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.</description><subject>architectural design</subject><subject>Computer architecture</subject><subject>Cost benefit analysis</subject><subject>countermeasures</subject><subject>Encoding</subject><subject>frameworks</subject><subject>Java</subject><subject>Maintenance costs</subject><subject>Network security</subject><subject>Open source software</subject><subject>Open systems</subject><subject>project cost</subject><subject>Security</subject><subject>security tactics</subject><subject>Software architecture</subject><subject>software architectures</subject><subject>Software development</subject><issn>0018-9162</issn><issn>1558-0814</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEURYMoWKsrl24GXMrU95JMk7grg1WhxUV1HWI-6JTq1CSz6L9vSsXV5cLhvcsh5BZhggjqcdlOKOB0whg9IyNsGlmDRH5ORgAoa4VTekmuUtqUymXDRkTMol132ds8RLOtZrtd7I1d-1Tlvlp5O8Qu75-qeT_EqjXJV6s8uM6na3IRzDb5m78ck8_580f7Wi_eX97a2aK2VGKuFQBYIREcbXigjoVm6tAIJiwqJpz6AuuDENQ6zwEaZYIUVrqAwXCnkI3J_elu2fU7-JT1pkz5KS81Sk6ZQsl4oR5OlI19StEHvYvdt4l7jaCPZvSy1Uczupgp9N2J7rz3_6QQnKLi7ADxjV0A</recordid><startdate>201611</startdate><enddate>201611</enddate><creator>Cervantes, Humberto</creator><creator>Kazman, Rick</creator><creator>Jungwoo Ryoo</creator><creator>Duyoung Choi</creator><creator>Duksung Jang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201611</creationdate><title>Architectural Approaches to Security: Four Case Studies</title><author>Cervantes, Humberto ; Kazman, Rick ; Jungwoo Ryoo ; Duyoung Choi ; Duksung Jang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>architectural design</topic><topic>Computer architecture</topic><topic>Cost benefit analysis</topic><topic>countermeasures</topic><topic>Encoding</topic><topic>frameworks</topic><topic>Java</topic><topic>Maintenance costs</topic><topic>Network security</topic><topic>Open source software</topic><topic>Open systems</topic><topic>project cost</topic><topic>Security</topic><topic>security tactics</topic><topic>Software architecture</topic><topic>software architectures</topic><topic>Software development</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cervantes, Humberto</creatorcontrib><creatorcontrib>Kazman, Rick</creatorcontrib><creatorcontrib>Jungwoo Ryoo</creatorcontrib><creatorcontrib>Duyoung Choi</creatorcontrib><creatorcontrib>Duksung Jang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer (Long Beach, Calif.)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cervantes, Humberto</au><au>Kazman, Rick</au><au>Jungwoo Ryoo</au><au>Duyoung Choi</au><au>Duksung Jang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Architectural Approaches to Security: Four Case Studies</atitle><jtitle>Computer (Long Beach, Calif.)</jtitle><stitle>MC</stitle><date>2016-11</date><risdate>2016</risdate><volume>49</volume><issue>11</issue><spage>60</spage><epage>67</epage><pages>60-67</pages><issn>0018-9162</issn><eissn>1558-0814</eissn><coden>CPTRB4</coden><abstract>An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MC.2016.332</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0018-9162
ispartof Computer (Long Beach, Calif.), 2016-11, Vol.49 (11), p.60-67
issn 0018-9162
1558-0814
language eng
recordid cdi_ieee_primary_7742194
source IEEE Electronic Library (IEL)
subjects architectural design
Computer architecture
Cost benefit analysis
countermeasures
Encoding
frameworks
Java
Maintenance costs
Network security
Open source software
Open systems
project cost
Security
security tactics
Software architecture
software architectures
Software development
title Architectural Approaches to Security: Four Case Studies
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A18%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Architectural%20Approaches%20to%20Security:%20Four%20Case%20Studies&rft.jtitle=Computer%20(Long%20Beach,%20Calif.)&rft.au=Cervantes,%20Humberto&rft.date=2016-11&rft.volume=49&rft.issue=11&rft.spage=60&rft.epage=67&rft.pages=60-67&rft.issn=0018-9162&rft.eissn=1558-0814&rft.coden=CPTRB4&rft_id=info:doi/10.1109/MC.2016.332&rft_dat=%3Cproquest_RIE%3E4258832611%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1842391834&rft_id=info:pmid/&rft_ieee_id=7742194&rfr_iscdi=true