Classifying security patterns

Eduardo B. Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukazawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

Abstract

Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. In addition to their value for new system design, security patterns are useful to evaluate existing systems. They are also useful to compare security standards and to verify that products comply with some standard. A variety of security patterns has been developed for the construction of secure systems and catalogs of them are appearing. However, catalogs of patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. We discuss here several ways to classify patterns. We show a way to use these classifications through pattern diagrams where a designer can navigate to perform her pattern selection.

Original languageEnglish
Title of host publicationProgress in WWW Research and Development - 10th Asia-Pacific Web Conference, APWeb 2008, Proceedings
Pages342-347
Number of pages6
DOIs
Publication statusPublished - 2008
Event10th Asia Pacific Conference on Web Technology, APWeb 2008 - Shenyang, China
Duration: 2008 Apr 262008 Apr 28

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4976 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th Asia Pacific Conference on Web Technology, APWeb 2008
Country/TerritoryChina
CityShenyang
Period08/4/2608/4/28

Keywords

  • Pattern classification
  • Secure system development
  • Security patterns
  • System architecture

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Classifying security patterns'. Together they form a unique fingerprint.

Cite this