Loading...
Please wait, while we are loading the content...
Similar Documents
A security-centric ring-based software architecture.
| Content Provider | CiteSeerX |
|---|---|
| Author | Tevis, Jay-Evan J. Hamilton, John A. |
| Abstract | Warden’s five-ring model Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic warfare attacks. We propose applying this same model to the domain of software in order to create a security-centric ring-based software architecture. This architecture would provide a foundation for software systems that would be highly resistant to malicious software. 1. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Security-centric Ring-based Software Architecture Layered Structure John Warden Malicious Software Five-ring Model Enemy System Strategic Warfare Attack Software System Five-ring Model Software Security Control |
| Content Type | Text |