Information Security and Ethics
DOI: 10.4018/9781599049373.ch050
|View full text |Cite
|
Sign up to set email alerts
|

A Methodology to Develop Secure Systems Using Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
1

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 0 publications
0
10
0
1
Order By: Relevance
“…To successfully utilize a security pattern, systematic guidelines should support its application throughout the entire software development lifecycle. Such a methodology to build secure systems using patterns was presented by Fernandez et al [12]. The methodology integrates security patterns into each one of the software development stages, where each stage can be tested for compliance with the principles presented by the patterns.…”
Section: Review and Evaluation Of Secure Software Development Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…To successfully utilize a security pattern, systematic guidelines should support its application throughout the entire software development lifecycle. Such a methodology to build secure systems using patterns was presented by Fernandez et al [12]. The methodology integrates security patterns into each one of the software development stages, where each stage can be tested for compliance with the principles presented by the patterns.…”
Section: Review and Evaluation Of Secure Software Development Methodsmentioning
confidence: 99%
“…Various efforts to deal with the security aspect at the early stages of the software development life cycle have been made. These include various extensions to UML that enable modeling of security features such as UMLsec [16], threat and attack modeling techniques such as misuse cases [31], methods for requirements engineering such as Secure Tropos [27], and methodologies for developing secure applications and databases such as [12,13]. Nevertheless, such methods primarily provide guidelines of how to deal with security within a certain stage of the software development process, or address only specific security-related aspects or mechanisms in the development process.…”
Section: Introductionmentioning
confidence: 99%
“…A methodology for integrating security patterns into all stages of the software development lifecycle is proposed in [11]. Other approaches [12] [13] present the use of aspect oriented software design approach to model security patterns as aspects and weave them into the functional model.…”
Section: Related Workmentioning
confidence: 99%
“…We have proposed a methodology that helps developers build secure systems through the use of patterns [9]. Our discussion here is independent of this methodology although this paper is a consequence of this work.…”
Section: Introductionmentioning
confidence: 98%