Professional Documents
Culture Documents
Keywords: software architecture, security by design, privacy by design, secure software architecture, architecture erosion,
architectural decay, architecture violations, architecture conformance checking, architecture compliance
checking, security constraints
Abstract: Today, security is still poorly considered in early phases of software engineering. Architects and software
engineers still lack knowledge about architectural security design as well as implementing it compliantly.
However, a software system that is not designed for security or does not adhere to this design can hardly meet
its security requirements. In this paper, we present an approach we are working on. The approach consists of
two parts: Firstly, we improve the architecture’s security level through model transformation. Secondly, we
derive rules and constraints from the secured architecture in order to check the implementation’s conformance.
Through these activities we aim to support architects and software developers in building a secure software
system. We plan to evaluate our approach in industrial case studies.