Enforcing architectural security decisions

S Jasser�- …�International Conference on Software Architecture �…, 2020 - ieeexplore.ieee.org
… We propose a conformance checking approach to monitor and, thereby, enforce architectural
security rules. We base our work on the ontology-based approach of Schr�der et al. [6] that …

Automatic enforcement of constraints in real-time collaborative architectural decision making

P Gaubatz, I Lytra, U Zdun�- Journal of Systems and Software, 2015 - Elsevier
architectural decision making by introducing the automatic enforcement of such constraints
during group decision making. … Security Experts shall propose a solution for the security and …

The Flask security architecture: System support for diverse security policies

R Spencer, S Smalley, P Loscocco, M Hibler…�- 8th USENIX Security�…, 1999 - usenix.org
… Flask architecture described in this paper could be employed to provide the security decisions
… subsystems that enforce security policy decisions and a subsystem which makes those …

[HTML][HTML] Security architecture for defining and enforcing security profiles in DLT/SDN-based IoT systems

SN Matheu, A Robles Enciso, A Molina Zarca…�- Sensors, 2020 - mdpi.com
… The priority field can be useful to resolve policy conflicts, deciding which policy should be
enforced. Depending on the capability, conditions and actions are different so they have been …

Architecture enforcement concerns and activities-an expert study

S Schr�der, M Soliman, M Riebisch�- Journal of Systems and Software, 2018 - Elsevier
… We call them macro architecture and micro architecture decisions. Some participants also
… to quality topics such as performance, scalability, security, or maintainability. The software …

Constraining the implementation through architectural security rules: An expert study

S Jasser�- Product-Focused Software Process Improvement: 20th�…, 2019 - Springer
… software architects to describe projects including all decisions … For each decision, related
common architectural securityarchitectural security rules would help architects to enforce and …

Formal modelling and automated trade-off analysis of enforcement architectures for cryptographic access control in the cloud

S Berlato, R Carbone, AJ Lee, S Ranise�- …�on Privacy and Security, 2021 - dl.acm.org
… to allow organisations to make more informed decisions by transparently evaluating the risk
… the mechanism chosen to enforce AC policies and the related architecture. We argue that, …

An approach for modeling and analysis of security system architectures

Y Deng, J Wang, JJP Tsai…�- IEEE Transactions on�…, 2003 - ieeexplore.ieee.org
… we model and analyze the architecture of the Resource Access Decision (RAD) Facility…
security system architecture and the constraint-driven process for enforcing and verifying security

Adding support for automatic enforcement of security policies in NFV networks

C Basile, F Valenza, A Lioy, DR Lopez…�- …�/ACM Transactions on�…, 2019 - ieeexplore.ieee.org
… also includes a decision phase where an … a NFV architecture is straightforward and effective,
as we easily included the SAM in OpenMANO. Then, we used the SAM to enforce security

[BOOK][B] Designing security architecture solutions

J Ramachandran - 2002 - books.google.com
security issues in an architectural context to guide the project. As system architects, we would
like to believe that all our decisions are … Architecture reviews are not about enforcement of …