Security patterns: comparing modeling approaches

@inproceedings{Nhlabatsi2010SecurityPC,
  title={Security patterns: comparing modeling approaches},
  author={A. Nhlabatsi and A. Bandara and Shinpei Hayashi and Charles B. Haley and J. J{\"u}rjens and H. Kaiya and A. Kubo and Robin C. Laney and H. Mouratidis and B. Nuseibeh and T. Tun and H. Washizaki and N. Yoshioka and Yijun Yu},
  year={2010}
}
  • A. Nhlabatsi, A. Bandara, +11 authors Yijun Yu
  • Published 2010
  • Engineering
  • Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by designers with little knowledge of security. Despite this benefit, there is lack of work that focus on evaluating the capabilities of security… CONTINUE READING
    31 Citations

    Figures and Tables from this paper

    A Methodology for Modeling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases
    • 3
    An approach to assess and compare quality of security models
    • 11
    • PDF
    Goal Modelling for Security Problem Matching and Pattern Enforcement
    • 3
    • PDF
    Taxonomy and Literature Survey of Security Pattern Research
    • 3
    Evolution of Security Engineering Artifacts: A State of the Art Survey
    • 12
    • PDF
    A Natural Classification Scheme for Software Security Patterns
    • A. Alvi, Mohammad Zulkernine
    • Computer Science
    • 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
    • 2011
    • 23
    Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach
    • 24
    A Comparison of SecureUML and UMLsec for Role-based Access Control
    • 16
    • Highly Influenced
    • PDF
    Security patterns: Research direction, metamodel, application and verification
    • H. Washizaki
    • Computer Science
    • 2017 International Workshop on Big Data and Information Security (IWBIS)
    • 2017
    • 3

    References

    SHOWING 1-10 OF 56 REFERENCES
    Security Patterns - Integrating Security and Systems Engineering
    • 628
    A survey on security patterns
    • 193
    • PDF
    Using abuse frames to bound the scope of security problems
    • 85
    • PDF
    Elaborating security requirements by construction of intentional anti-models
    • A. V. Lamsweerde
    • Engineering, Computer Science
    • Proceedings. 26th International Conference on Software Engineering
    • 2004
    • 452
    • PDF
    Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns
    • 42
    • PDF
    When security meets software engineering: a case of modelling secure information systems
    • 130
    • PDF
    Security and privacy requirements analysis within a social setting
    • L. Liu, E. Yu, J. Mylopoulos
    • Computer Science
    • Proceedings. 11th IEEE International Requirements Engineering Conference, 2003.
    • 2003
    • 419
    • PDF