TY - GEN
T1 - Revising a security tactics hierarchy through decomposition, reclassification, and derivation
AU - Ryoo, Jungwoo
AU - Laplante, Phil
AU - Kazman, Rick
PY - 2012/10/5
Y1 - 2012/10/5
N2 - Software architecture is the set of important design decisions that address cross-cutting system quality attributes such as security, reliability, availability, and performance. Practitioners often face difficulty in beginning an architectural design due to the lack of concrete building blocks available to them. Tactics are fundamental design decisions and play the role of these initial design primitives and complement the existing design constructs such as architectural or design patterns. A tactic is a relatively new design concept, and tactics repositories are still being developed. However, the maturity of these repositories is inconsistent, and varies depending on the quality attribute. To address this inconsistency and to promote a more rigorous, repeatable method for creating and revising tactics hierarchies, we propose a novel methodology of extracting tactics. This methodology, we claim, can accelerate the development of tactics repositories that are truly useful to practitioners. We discuss three approaches for extracting these tactics. The first is to derive new tactics from the existing ones. The second is to decompose an existing architectural pattern into its constituent tactics. Finally, we extract tactics that have been misidentified as patterns. Among the many types of tactics available, this paper focuses on security tactics. Using our methodology, we revise a well-known taxonomy of security tactics. We contend that the revised hierarchy is complete enough for use in practical applications.
AB - Software architecture is the set of important design decisions that address cross-cutting system quality attributes such as security, reliability, availability, and performance. Practitioners often face difficulty in beginning an architectural design due to the lack of concrete building blocks available to them. Tactics are fundamental design decisions and play the role of these initial design primitives and complement the existing design constructs such as architectural or design patterns. A tactic is a relatively new design concept, and tactics repositories are still being developed. However, the maturity of these repositories is inconsistent, and varies depending on the quality attribute. To address this inconsistency and to promote a more rigorous, repeatable method for creating and revising tactics hierarchies, we propose a novel methodology of extracting tactics. This methodology, we claim, can accelerate the development of tactics repositories that are truly useful to practitioners. We discuss three approaches for extracting these tactics. The first is to derive new tactics from the existing ones. The second is to decompose an existing architectural pattern into its constituent tactics. Finally, we extract tactics that have been misidentified as patterns. Among the many types of tactics available, this paper focuses on security tactics. Using our methodology, we revise a well-known taxonomy of security tactics. We contend that the revised hierarchy is complete enough for use in practical applications.
UR - http://www.scopus.com/inward/record.url?scp=84866893007&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84866893007&partnerID=8YFLogxK
U2 - 10.1109/SERE-C.2012.18
DO - 10.1109/SERE-C.2012.18
M3 - Conference contribution
AN - SCOPUS:84866893007
SN - 9780769547435
T3 - Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
SP - 85
EP - 91
BT - Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
T2 - 2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012
Y2 - 20 June 2012 through 22 June 2012
ER -