Selecting Security Patterns that Fulfill Security Requirements


Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements.

DOI: 10.1109/RE.2008.32

Extracted Key Phrases

1 Figure or Table

Cite this paper

@inproceedings{Weiss2008SelectingSP, title={Selecting Security Patterns that Fulfill Security Requirements}, author={Michael Weiss and Haralambos Mouratidis}, booktitle={RE}, year={2008} }