{"title":"构建安全系统:从威胁到安全模式","authors":"E. Fernández, S. Mujica","doi":"10.1109/SCCC.2010.36","DOIUrl":null,"url":null,"abstract":"We present an approach using two dimensions to propagate security restrictions: along the lifecycle and along the architectural levels. We believe that this double propagation can be very effective for security. This approach can also facilitate the security analysis of the system.","PeriodicalId":394608,"journal":{"name":"2010 XXIX International Conference of the Chilean Computer Science Society","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Building Secure Systems: From Threats to Security Patterns\",\"authors\":\"E. Fernández, S. Mujica\",\"doi\":\"10.1109/SCCC.2010.36\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present an approach using two dimensions to propagate security restrictions: along the lifecycle and along the architectural levels. We believe that this double propagation can be very effective for security. This approach can also facilitate the security analysis of the system.\",\"PeriodicalId\":394608,\"journal\":{\"name\":\"2010 XXIX International Conference of the Chilean Computer Science Society\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 XXIX International Conference of the Chilean Computer Science Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCCC.2010.36\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 XXIX International Conference of the Chilean Computer Science Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCCC.2010.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Building Secure Systems: From Threats to Security Patterns
We present an approach using two dimensions to propagate security restrictions: along the lifecycle and along the architectural levels. We believe that this double propagation can be very effective for security. This approach can also facilitate the security analysis of the system.