Proceedings From the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
DOI: 10.1109/iaw.2004.1437841
|View full text |Cite
|
Sign up to set email alerts
|

Security in software architecture: a case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Hoo, Sudbury, and Jaquith (2001) examined the software development and maintenance costs (e.g., patch development costs) associated with security in particular and concluded that return on investment (ROI) was "from 12-21%, with the highest rate of return occurring when analysis is performed during application design." Likewise reinforcing the notion of early consideration, the final security assurance attained by software products has also been shown to improve when security is considered early in design (Sachitano, Chapman, & Hamilton, 2004). Security improvements indirectly translate into operational cost savings since companies and/or users are less likely to incur losses and down-time when using a more secure software product; less time and money is wasted recovering from attacks enabled by software security vulnerabilities.…”
Section: Fundamental Question and Motivationmentioning
confidence: 93%
See 1 more Smart Citation
“…Hoo, Sudbury, and Jaquith (2001) examined the software development and maintenance costs (e.g., patch development costs) associated with security in particular and concluded that return on investment (ROI) was "from 12-21%, with the highest rate of return occurring when analysis is performed during application design." Likewise reinforcing the notion of early consideration, the final security assurance attained by software products has also been shown to improve when security is considered early in design (Sachitano, Chapman, & Hamilton, 2004). Security improvements indirectly translate into operational cost savings since companies and/or users are less likely to incur losses and down-time when using a more secure software product; less time and money is wasted recovering from attacks enabled by software security vulnerabilities.…”
Section: Fundamental Question and Motivationmentioning
confidence: 93%
“…Furthermore, this post-mortem advisory counting technique only works on products from the same product line or that perform identical functions. In the case of Sachitano et al (2004), the security attributes of two mail programs were being compared. In the case of Alhazmi et al (2005), a model for vulnerability discovery rate in subsequent operating system versions was being validated.…”
Section: Current Challengesmentioning
confidence: 99%
“…Design Level Security Metrics: Measuring security at the design phase, based on typical design artifacts, has not been considered until recently even though such metrics could efficiently eliminate software security vulnerabilities before they reach the final product [44], [45]. Such metrics would also allow software developers to compare the security level of various alternative designs under consideration.…”
Section: Lecture Notes On Software Engineering Vol 4 No 2 May 2016mentioning
confidence: 99%
“…Instead, the most efficient approach is to enforce security at early phases of the software development lifecycle such as during the design phase [4] [5]. The National Institute of Standards and Technology [14] stated that eliminating vulnerabilities in the design stage can cost 30 times less than fixing them at a later stage.…”
Section: Related Work and Research Problemmentioning
confidence: 99%
“…Furthermore, those security measurements which have been defined either assess security at the abstract system architecture level [2] or at the low level of program code [3]. Measuring security at the design phase, based on typical design artifacts, has not been considered even though such metrics could have efficiently eliminated software security vulnerabilities before they reach the finalised product [4] [5]. Such metrics would also allow software developers to compare the security level of various alternative designs under consideration.…”
Section: Introductionmentioning
confidence: 99%