{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:44Z","timestamp":1750308104347,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2005,5,15]],"date-time":"2005-05-15T00:00:00Z","timestamp":1116115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>Security is a very important concern for software architecture and software components. Previous modeling approaches provide insufficient support for an in-depth treatment of security. This paper argues for a more comprehensive treatment based on software connectors. Connectors provide a suitable vehicle to model, capture, and enforce security. Our approach models security principal, privilege, trust, and context of architectural constituents. Extending our existing architecture description language and support tools, our approach can facilitate describing the security characteristics of an architecture generating enabling infrastructure, and monitoring run-time conformance. Initial results of applying this approach are illustrated through a case study. The contribution of this research is a deeper and more comprehensive treatment of architectural security through software connectors.<\/jats:p>","DOI":"10.1145\/1082983.1083203","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards an architectural treatment of software security"],"prefix":"10.1145","volume":"30","author":[{"given":"Jie","family":"Ren","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA"}]},{"given":"Richard","family":"Taylor","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA"}]},{"given":"Paul","family":"Dourish","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA"}]},{"given":"David","family":"Redmiles","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA"}]}],"member":"320","published-online":{"date-parts":[[2005,5,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/258077.258078"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/501317.501328"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647014.713147"},{"key":"e_1_2_1_5_1","volume-title":"The J2ee#8482","author":"Bodoff S.","year":"2004","edition":"2"},{"volume-title":"Web Distributed Authoring and Versioning (Webdav) Access Control Protocol. RFC 3744","year":"2004","author":"Clemm G.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","first-page":"43","volume-title":"Aspect-Oriented Software Architecture. in Proceedings of 1st European Workshop on Software Architecture","author":"Cuesta C. E.","year":"2004"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581374"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908958"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1232267"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/267895.267928"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/966618.966633"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20040920"},{"key":"e_1_2_1_15_1","first-page":"412","volume-title":"J. Umlsec: Extending Uml for Secure Systems Development. in Proceedings of UML '02: Proceedings of the 5th International Conference on The Unified Modeling Language","author":"J\u00fcrjens","year":"2002"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/643603.643604"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_2_1_18_1","first-page":"426","volume-title":"Secureuml: A Uml-Based Modeling Language for Model-Driven Security. in Proceedings of UML '02: Proceedings of the 5th International Conference on The Unified Modeling Language","author":"Lodderstedt T.","year":"2002"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/839268.839272"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/239098.239104"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.825767"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337201"},{"key":"e_1_2_1_23_1","first-page":"84","volume-title":"Secure Software Architectures. in Proceedings of 1997 IEEE Symposium on Security and Privacy","author":"Moriconi M.","year":"1997"},{"key":"e_1_2_1_24_1","first-page":"575","volume":"200","author":"Ray I.","journal-title":"Software Technology"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948424"},{"volume-title":"Aosam: A Formal Framework for Aspect-Oriented Software Architecture Specifications. in Proceedings of The 8th IASTED International Conference on Software Engineering and Applications","year":"2004","author":"Sun W.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","first-page":"102","volume-title":"Architectural Reflection. Realising Software Architectures Via Reflective Activities. in Proceedings of 2nd International Workshop on Engineering Distributed Objects","author":"Tisato F.","year":"2000"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253571"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759008.1759028"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1082983.1083203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:05Z","timestamp":1750262885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083203"}},"subtitle":["a connector-centric approach"],"short-title":[],"issued":{"date-parts":[[2005,5,15]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1082983.1083203"],"URL":"https:\/\/doi.org\/10.1145\/1082983.1083203","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1083200.1083203","asserted-by":"subject"}]},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,5,15]]},"assertion":[{"value":"2005-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}