Abstract
Existing research on systems security has focused on coding, providing little insight into how to create a secure architecture. Combining architectural analysis techniques based on tactics, patterns, and vulnerabilities will achieve the best outcomes.
Original language | English (US) |
---|---|
Article number | 7349074 |
Pages (from-to) | 52-59 |
Number of pages | 8 |
Journal | IEEE Security and Privacy |
Volume | 13 |
Issue number | 6 |
DOIs | |
State | Published - Nov 1 2015 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law