Automated software architecture security risk analysis using formalized signatures.
Mohamed AlmorsyJohn GrundyAmani S. IbrahimPublished in: ICSE (2013)
Keyphrases
- risk analysis
- software architecture
- risk management
- risk assessment
- information security
- security requirements
- functional requirements
- software engineering
- decision making
- software systems
- embedded software
- risk factors
- critical infrastructure
- software development
- distributed systems
- real world
- influence diagrams
- fuzzy numbers
- quality attributes
- databases
- network security
- signature scheme
- high level