Show simple item record

dc.contributor.advisorPerry, Dewayne E.en
dc.creatorLakshminarayanan, Vidya L.en
dc.date.accessioned2015-09-01T20:30:22Zen
dc.date.available2015-09-01T20:30:22Zen
dc.date.issued2006-12en
dc.identifier.urihttp://hdl.handle.net/2152/30494en
dc.description.abstractWhile security has long been a significant issue in military systems, the spread of the internet has stimulated a growing interest in, and increasing demand for, secure systems. Understanding how architects manage security requirements in practice is a necessary first step in providing repeatable processes using effective techniques, methods, and architectural structures. In this thesis, I present the results of multiple cases of practicing security architects: key aspects in security requirements, critical issues in managing security requirements, essential characteristics of security architects, how architects define security architecture, and how requirements are transformed into architectures and implemented.en
dc.format.mediumelectronicen
dc.language.isoengen
dc.relation.ispartofUT Electronic Theses and Dissertationsen
dc.rightsCopyright © is held by the author. Presentation of this material on the Libraries' web site by University Libraries, The University of Texas at Austin was made possible under a limited license grant from the author who has retained all copyrights in the works.en
dc.subjectComputer securityen
dc.subjectComputer architectureen
dc.subjectSecurity architectsen
dc.titleSecurity architects in practiceen
dc.typeThesisen
dc.description.departmentElectrical and Computer Engineeringen
dc.type.genreThesisen
thesis.degree.departmentElectrical and Computer Engineeringen
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorThe University of Texas at Austinen
thesis.degree.levelMastersen
thesis.degree.nameMaster of Scienceen
dc.rights.restrictionRestricteden


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record