Using Security Patterns to Develop Secure Systems - Ten Years Later

E. Fernández, H. Washizaki, Nobukazu Yoshioka
{"title":"Using Security Patterns to Develop Secure Systems - Ten Years Later","authors":"E. Fernández, H. Washizaki, Nobukazu Yoshioka","doi":"10.4018/IJSSSP.2018100103","DOIUrl":null,"url":null,"abstract":"The authors describe continuing work on the use of patterns in the development of secure systems. This work started as collaboration among five research centers on three continents and continues with a reduced number of involved researchers. Patterns are applied to all aspects of development, from domain analysis and attack modeling to basic design, and to all aspects of the systems under development, from the database and infrastructure to policies, monitoring, and forensics. The article provides an overview of a method of development involving the full range of patterns and describes recent contributions from some of the research threads being pursued within the collaboration.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Syst. Softw. Secur. Prot.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJSSSP.2018100103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The authors describe continuing work on the use of patterns in the development of secure systems. This work started as collaboration among five research centers on three continents and continues with a reduced number of involved researchers. Patterns are applied to all aspects of development, from domain analysis and attack modeling to basic design, and to all aspects of the systems under development, from the database and infrastructure to policies, monitoring, and forensics. The article provides an overview of a method of development involving the full range of patterns and describes recent contributions from some of the research threads being pursued within the collaboration.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用安全模式开发安全系统——十年后
作者描述了在安全系统开发中使用模式的持续工作。这项工作开始于三大洲五个研究中心之间的合作,并在参与研究人员数量减少的情况下继续进行。模式应用于开发的所有方面,从领域分析和攻击建模到基本设计,以及正在开发的系统的所有方面,从数据库和基础设施到策略、监视和取证。本文概述了一种涉及所有模式的开发方法,并描述了合作中正在进行的一些研究线程的最新贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control Proposed Secure 3-Use Case Diagram A Novel Iterated Function System-Based Model for Coloured Image Encryption Formal Metamodeling for Secure Model-Driven Engineering Cloud Computing Virtual Machine Workload Prediction Method Based on Variational Autoencoder
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1