2018
DOI: 10.1002/smr.1980
|View full text |Cite
|
Sign up to set email alerts
|

Assessing and improving the quality of security methodologies for distributed systems

Abstract: Security methodologies represent systematic approaches for introducing security attributes into a system throughout the development lifecycle. While isolated attempts have been made to demonstrate the value of particular security methodologies, the “quality” of security methodologies, as such, has never been given due consideration; indeed, it has never been studied as a self‐standing topic. The literature therefore entirely lacks supportive artifacts that can provide a basis for assessing, and hence for impro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 78 publications
0
7
0
Order By: Relevance
“…Currently developed IDSs do not show clear, structured software development processes. Consequently, resulting inadequate requirement management, processing, validation, and verification of requirements quality [19]. To elaborate more on the evidence provided in the literature, the detection process is not deployed at each layer of the hierarchy.…”
Section: Shortcomings Of Existing Idss From Se Perspectivesmentioning
confidence: 99%
See 2 more Smart Citations
“…Currently developed IDSs do not show clear, structured software development processes. Consequently, resulting inadequate requirement management, processing, validation, and verification of requirements quality [19]. To elaborate more on the evidence provided in the literature, the detection process is not deployed at each layer of the hierarchy.…”
Section: Shortcomings Of Existing Idss From Se Perspectivesmentioning
confidence: 99%
“…Hence, recharging or replacing those sensor nodes will cost more because of the far distance.As for the security of WSNs, owing to the network limitations, it is difficult to achieve security in applications deployed over WSNs [8]. These sorts of networks are usually deployed in remote and hostile environments to perform its tasks [4,12,19]. However, hostile environments are usually unattended.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In our case, we needed a metamodel that covers the main components of a big data ecosystem and which at the same time incorporates security aspects into those components: the security reference architecture (SRA) for big data, defined in the previous section. The process follows the recommendations from the security-by-design approach [43,44] by taking security into consideration from the early stages of the process and by including security aspects during the whole process.…”
Section: Process For the Development Of A Secure Big Data Ecosystemmentioning
confidence: 99%
“…Our proposal is composed by twelve different phases covering the main stages of development, including analysis and design which, normally, are not sufficiently considered in this kind of scenarios. Moreover, it is important to highlight that a process of this kind should not be only a description of a set of activities; in fact, it should be supported by a conceptual framework that defines the main components of the system to develop [14]. In our case, we needed a metamodel that covers the main components of a Big Data ecosystem and, at the same time, incorporates security aspects into them; for this, we have defined a customized Security Reference Architecture (SRA) for Big Data [15].…”
Section: Introductionmentioning
confidence: 99%