loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Joshua J. Pauli 1 and Dianxiang Xu 2

Affiliations: 1 Dakota State University, United States ; 2 North Dakota State University, United States

Abstract: Based on the threat-driven architectural design of secure information systems, this paper introduces an approach for the tradeoff analysis of secure software architectures in order to determine the effects of security requirements on the system. We use a case study on a payroll information system (PIS) to show the approach from misuse case identification through the architecture tradeoff analysis. In the case study, we discuss how to make tradeoff between security and availability with respect to the number of servers present.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.129.39.55

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
J. Pauli, J. and Xu, D. (2005). Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study. In Proceedings of the 3rd International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems (ICEIS 2005) - MSVVEIS; ISBN 972-8865-22-8, SciTePress, pages 89-95. DOI: 10.5220/0002560100890095

@conference{msvveis05,
author={Joshua {J. Pauli}. and Dianxiang Xu.},
title={Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study},
booktitle={Proceedings of the 3rd International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems (ICEIS 2005) - MSVVEIS},
year={2005},
pages={89-95},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002560100890095},
isbn={972-8865-22-8},
}

TY - CONF

JO - Proceedings of the 3rd International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems (ICEIS 2005) - MSVVEIS
TI - Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study
SN - 972-8865-22-8
AU - J. Pauli, J.
AU - Xu, D.
PY - 2005
SP - 89
EP - 95
DO - 10.5220/0002560100890095
PB - SciTePress