Assessing Architecture Conformance to Security-Related Practices in Infrastructure as Code Based Deployments.
Evangelos NtentosUwe ZdunGhareeb FalaziUwe BreitenbücherFrank LeymannPublished in: SCC (2022)
Keyphrases
- highly distributed
- enterprise systems
- service architecture
- security architecture
- design considerations
- case study
- application programming interface
- data flow
- software architecture
- digital rights management
- information security
- loosely coupled
- security issues
- autonomous systems
- grid services
- access control
- real time
- configuration management
- security policies
- situational awareness
- network security
- service management
- seamless integration
- distributed systems
- source code
- business logic
- network architecture