A Security Engineering Process based on Patterns

  title={A Security Engineering Process based on Patterns},
  author={Denis Hatebur and Maritta Heisel and Holger Schmidt},
  journal={18th International Workshop on Database and Expert Systems Applications (DEXA 2007)},
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. We describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Further, we introduce a new frame that focuses on… CONTINUE READING
Highly Cited
This paper has 101 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper


Publications citing this paper.
Showing 1-10 of 22 extracted citations

A Literature Study on Privacy Patterns Research

2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) • 2017

Characterizations and boundaries of security requirements patterns

2012 Second IEEE International Workshop on Requirements Patterns (RePa) • 2012
View 2 Excerpts

102 Citations

Citations per Year
Semantic Scholar estimates that this publication has 102 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 11 references

A Pattern System for Security Requirements Engineering

The Second International Conference on Availability, Reliability and Security (ARES'07) • 2007
View 4 Excerpts

A methodology for secure software design

E. Fernandez
In Proc. Int. Conference on Software Engineering Research and Practice, • 2004
View 1 Excerpt

Using abuse frames to bound the scope of security problems

Proceedings. 12th IEEE International Requirements Engineering Conference, 2004. • 2004
View 1 Excerpt

Similar Papers

Loading similar papers…