Publication | Closed Access
Foundations for Survivable Systems Engineering
14
Citations
1
References
2002
Year
Unknown Venue
EngineeringSurvivable SystemInformation SecurityBoundary ControllersFormal VerificationComplex System EngineeringHardware SecuritySystem Of Systems EngineeringSecurity ModellingSystems EngineeringSecurity ControlComputer EngineeringSecure By DesignComputer ScienceSecurity AdministrationSurvivable SystemsData SecurityPhysical SecuritySurvivabilitySecurityControl System SecurityUser Task
security is addressed too late in the development cycle, with boundary controllers used for after-the-fact remediation when systems are deployed. Moreover, the adequacy of boundary controllers decreases as user task flows traverse multiple system boundaries and security administration domains. Sophisticated intruders can attack a broad range of targets across domains. Resistance and response to such attacks are often the responsibility of multiple enterprises and their system and application architectures.
| Year | Citations | |
|---|---|---|
Page 1
Page 1