Security patterns: comparing modeling approaches
@inproceedings{Nhlabatsi2010SecurityPC, title={Security patterns: comparing modeling approaches}, author={A. Nhlabatsi and A. Bandara and Shinpei Hayashi and Charles B. Haley and J. J{\"u}rjens and H. Kaiya and A. Kubo and Robin C. Laney and H. Mouratidis and B. Nuseibeh and T. Tun and H. Washizaki and N. Yoshioka and Yijun Yu}, year={2010} }
Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by designers with little knowledge of security. Despite this benefit, there is lack of work that focus on evaluating the capabilities of security… CONTINUE READING
Figures and Tables from this paper
31 Citations
A Methodology for Modeling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases
- Computer Science
- 2018 7th International Conference on Computer and Communication Engineering (ICCCE)
- 2018
- 3
An approach to assess and compare quality of security models
- Computer Science
- Comput. Sci. Inf. Syst.
- 2011
- 11
- PDF
Goal Modelling for Security Problem Matching and Pattern Enforcement
- Computer Science
- Int. J. Secur. Softw. Eng.
- 2017
- 3
- PDF
Taxonomy and Literature Survey of Security Pattern Research
- 2018 IEEE Conference on Application, Information and Network Security (AINS)
- 2018
- 3
Evolution of Security Engineering Artifacts: A State of the Art Survey
- Computer Science
- Int. J. Secur. Softw. Eng.
- 2014
- 12
- PDF
A Natural Classification Scheme for Software Security Patterns
- Computer Science
- 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
- 2011
- 23
Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach
- Computer Science
- Domain-Specific Conceptual Modeling
- 2016
- 24
Security patterns: Research direction, metamodel, application and verification
- Computer Science
- 2017 International Workshop on Big Data and Information Security (IWBIS)
- 2017
- 3
References
SHOWING 1-10 OF 56 REFERENCES
Security Patterns - Integrating Security and Systems Engineering
- Computer Science, Engineering
- 2005
- 628
Design of a Modelling Language for Information System Security Risk Management
- Computer Science
- RCIS
- 2007
- 59
- PDF
Using abuse frames to bound the scope of security problems
- Engineering, Computer Science
- Proceedings. 12th IEEE International Requirements Engineering Conference, 2004.
- 2004
- 85
- PDF
Elaborating security requirements by construction of intentional anti-models
- Engineering, Computer Science
- Proceedings. 26th International Conference on Software Engineering
- 2004
- 452
- PDF
Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns
- Computer Science
- Int. J. Softw. Eng. Knowl. Eng.
- 2006
- 42
- PDF
When security meets software engineering: a case of modelling secure information systems
- Computer Science
- Inf. Syst.
- 2005
- 130
- PDF
A security oriented approach in the development of multiagent systems : applied to the management of the health and social care needs of older people in England
- Engineering
- 2004
- 56
- PDF
Security and privacy requirements analysis within a social setting
- Computer Science
- Proceedings. 11th IEEE International Requirements Engineering Conference, 2003.
- 2003
- 419
- PDF