Security characterization for evaluation of software architectures using ATAM
2009 (English)In: IEEE International Conference on Information and Communication Technologies, 2009. ICICT '09., Karachi, Pakistan, 2009, 241-246 p.Conference paper (Refereed)
Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation. Considering this aspect we have highlighted in this paper, security evaluation of an ongoing e-society project ESAM using Architectural Tradeoff Analysis Method (ATAM). ESAM is a web based system intended to provide e-services to the Swedish community residents. ATAM is primarily used for architectural evaluation aligned with the quality goals i.e. performance, availability and modifiability of an organization. We present research analysis for characterization, stimuli, and architectural decisions to evaluate software architecture with respect to security measures using ATAM. This security characterization will serve as a tool to evaluate security aspects of a software architecture using ATAM. We believe that ATAM capability of evaluating software security will provide potential benefits in secure software development.
Place, publisher, year, edition, pages
Karachi, Pakistan, 2009. 241-246 p.
Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-11196DOI: 10.1109/ICICT.2009.5267185ISI: 000278475900036ScopusID: 2-s2.0-70449775106OAI: oai:DiVA.org:kth-11196DiVA: diva2:241374
3rd International Conference on Information and Communication Technologies Karachi, PAKISTAN, AUG 15-16, 2009
QC 201102182009-10-022009-10-022011-02-18Bibliographically approved