Architectural Approaches to Security: Four Case Studies
An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.
Gespeichert in:
Veröffentlicht in: | Computer (Long Beach, Calif.) Calif.), 2016-11, Vol.49 (11), p.60-67 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 67 |
---|---|
container_issue | 11 |
container_start_page | 60 |
container_title | Computer (Long Beach, Calif.) |
container_volume | 49 |
creator | Cervantes, Humberto Kazman, Rick Jungwoo Ryoo Duyoung Choi Duksung Jang |
description | An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs. |
doi_str_mv | 10.1109/MC.2016.332 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_7742194</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7742194</ieee_id><sourcerecordid>4258832611</sourcerecordid><originalsourceid>FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</originalsourceid><addsrcrecordid>eNo9kE1LAzEURYMoWKsrl24GXMrU95JMk7grg1WhxUV1HWI-6JTq1CSz6L9vSsXV5cLhvcsh5BZhggjqcdlOKOB0whg9IyNsGlmDRH5ORgAoa4VTekmuUtqUymXDRkTMol132ds8RLOtZrtd7I1d-1Tlvlp5O8Qu75-qeT_EqjXJV6s8uM6na3IRzDb5m78ck8_580f7Wi_eX97a2aK2VGKuFQBYIREcbXigjoVm6tAIJiwqJpz6AuuDENQ6zwEaZYIUVrqAwXCnkI3J_elu2fU7-JT1pkz5KS81Sk6ZQsl4oR5OlI19StEHvYvdt4l7jaCPZvSy1Uczupgp9N2J7rz3_6QQnKLi7ADxjV0A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1842391834</pqid></control><display><type>article</type><title>Architectural Approaches to Security: Four Case Studies</title><source>IEEE Electronic Library (IEL)</source><creator>Cervantes, Humberto ; Kazman, Rick ; Jungwoo Ryoo ; Duyoung Choi ; Duksung Jang</creator><creatorcontrib>Cervantes, Humberto ; Kazman, Rick ; Jungwoo Ryoo ; Duyoung Choi ; Duksung Jang</creatorcontrib><description>An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.</description><identifier>ISSN: 0018-9162</identifier><identifier>EISSN: 1558-0814</identifier><identifier>DOI: 10.1109/MC.2016.332</identifier><identifier>CODEN: CPTRB4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>architectural design ; Computer architecture ; Cost benefit analysis ; countermeasures ; Encoding ; frameworks ; Java ; Maintenance costs ; Network security ; Open source software ; Open systems ; project cost ; Security ; security tactics ; Software architecture ; software architectures ; Software development</subject><ispartof>Computer (Long Beach, Calif.), 2016-11, Vol.49 (11), p.60-67</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nov 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</citedby><cites>FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7742194$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7742194$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cervantes, Humberto</creatorcontrib><creatorcontrib>Kazman, Rick</creatorcontrib><creatorcontrib>Jungwoo Ryoo</creatorcontrib><creatorcontrib>Duyoung Choi</creatorcontrib><creatorcontrib>Duksung Jang</creatorcontrib><title>Architectural Approaches to Security: Four Case Studies</title><title>Computer (Long Beach, Calif.)</title><addtitle>MC</addtitle><description>An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.</description><subject>architectural design</subject><subject>Computer architecture</subject><subject>Cost benefit analysis</subject><subject>countermeasures</subject><subject>Encoding</subject><subject>frameworks</subject><subject>Java</subject><subject>Maintenance costs</subject><subject>Network security</subject><subject>Open source software</subject><subject>Open systems</subject><subject>project cost</subject><subject>Security</subject><subject>security tactics</subject><subject>Software architecture</subject><subject>software architectures</subject><subject>Software development</subject><issn>0018-9162</issn><issn>1558-0814</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEURYMoWKsrl24GXMrU95JMk7grg1WhxUV1HWI-6JTq1CSz6L9vSsXV5cLhvcsh5BZhggjqcdlOKOB0whg9IyNsGlmDRH5ORgAoa4VTekmuUtqUymXDRkTMol132ds8RLOtZrtd7I1d-1Tlvlp5O8Qu75-qeT_EqjXJV6s8uM6na3IRzDb5m78ck8_580f7Wi_eX97a2aK2VGKuFQBYIREcbXigjoVm6tAIJiwqJpz6AuuDENQ6zwEaZYIUVrqAwXCnkI3J_elu2fU7-JT1pkz5KS81Sk6ZQsl4oR5OlI19StEHvYvdt4l7jaCPZvSy1Uczupgp9N2J7rz3_6QQnKLi7ADxjV0A</recordid><startdate>201611</startdate><enddate>201611</enddate><creator>Cervantes, Humberto</creator><creator>Kazman, Rick</creator><creator>Jungwoo Ryoo</creator><creator>Duyoung Choi</creator><creator>Duksung Jang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201611</creationdate><title>Architectural Approaches to Security: Four Case Studies</title><author>Cervantes, Humberto ; Kazman, Rick ; Jungwoo Ryoo ; Duyoung Choi ; Duksung Jang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c281t-9000c7810d254f2d3f56d1a737c1937d9b0cef772cde40059af87c8df1fa4d913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>architectural design</topic><topic>Computer architecture</topic><topic>Cost benefit analysis</topic><topic>countermeasures</topic><topic>Encoding</topic><topic>frameworks</topic><topic>Java</topic><topic>Maintenance costs</topic><topic>Network security</topic><topic>Open source software</topic><topic>Open systems</topic><topic>project cost</topic><topic>Security</topic><topic>security tactics</topic><topic>Software architecture</topic><topic>software architectures</topic><topic>Software development</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Cervantes, Humberto</creatorcontrib><creatorcontrib>Kazman, Rick</creatorcontrib><creatorcontrib>Jungwoo Ryoo</creatorcontrib><creatorcontrib>Duyoung Choi</creatorcontrib><creatorcontrib>Duksung Jang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer (Long Beach, Calif.)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cervantes, Humberto</au><au>Kazman, Rick</au><au>Jungwoo Ryoo</au><au>Duyoung Choi</au><au>Duksung Jang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Architectural Approaches to Security: Four Case Studies</atitle><jtitle>Computer (Long Beach, Calif.)</jtitle><stitle>MC</stitle><date>2016-11</date><risdate>2016</risdate><volume>49</volume><issue>11</issue><spage>60</spage><epage>67</epage><pages>60-67</pages><issn>0018-9162</issn><eissn>1558-0814</eissn><coden>CPTRB4</coden><abstract>An examination of the security approaches in industrial and open source projects shows that a strategic, systemwide architectural approach, implemented as a security framework or as a platform built using these frameworks, results in the highest security and lowest maintenance costs.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MC.2016.332</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0018-9162 |
ispartof | Computer (Long Beach, Calif.), 2016-11, Vol.49 (11), p.60-67 |
issn | 0018-9162 1558-0814 |
language | eng |
recordid | cdi_ieee_primary_7742194 |
source | IEEE Electronic Library (IEL) |
subjects | architectural design Computer architecture Cost benefit analysis countermeasures Encoding frameworks Java Maintenance costs Network security Open source software Open systems project cost Security security tactics Software architecture software architectures Software development |
title | Architectural Approaches to Security: Four Case Studies |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A18%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Architectural%20Approaches%20to%20Security:%20Four%20Case%20Studies&rft.jtitle=Computer%20(Long%20Beach,%20Calif.)&rft.au=Cervantes,%20Humberto&rft.date=2016-11&rft.volume=49&rft.issue=11&rft.spage=60&rft.epage=67&rft.pages=60-67&rft.issn=0018-9162&rft.eissn=1558-0814&rft.coden=CPTRB4&rft_id=info:doi/10.1109/MC.2016.332&rft_dat=%3Cproquest_RIE%3E4258832611%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1842391834&rft_id=info:pmid/&rft_ieee_id=7742194&rfr_iscdi=true |