Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007) 2007
DOI: 10.1109/sess.2007.4
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of the Security Patterns Landscape

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(46 citation statements)
references
References 2 publications
0
46
0
Order By: Relevance
“…We believe that such a framework not only helps ensure the integration of security patterns with best practices early in the development process, but also helps to resolve two issues noted in the security patterns literature. The first is the observation that 35 percent of the published patterns do not pass the soundness test for patterns and, therefore, are considered to be guidelines or principles rather than formal patterns [17]. For example, security patterns like Asset Valuation and Threat Assessment [13] don't conform to the formal definition of a security pattern [17,33].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…We believe that such a framework not only helps ensure the integration of security patterns with best practices early in the development process, but also helps to resolve two issues noted in the security patterns literature. The first is the observation that 35 percent of the published patterns do not pass the soundness test for patterns and, therefore, are considered to be guidelines or principles rather than formal patterns [17]. For example, security patterns like Asset Valuation and Threat Assessment [13] don't conform to the formal definition of a security pattern [17,33].…”
Section: Discussionmentioning
confidence: 99%
“…The first is the observation that 35 percent of the published patterns do not pass the soundness test for patterns and, therefore, are considered to be guidelines or principles rather than formal patterns [17]. For example, security patterns like Asset Valuation and Threat Assessment [13] don't conform to the formal definition of a security pattern [17,33]. However, since the ISDF incorporates best practices to guide secure development, patterns such as those can be avoided.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Firstly, the techniques employed are mostly on the deployment level. Most of the previous work focus on implementation levels, such as cryptography protocols and algorithms [25,23], design patterns for system design and implementation [12,11], and internal control mechanisms [7,9].…”
Section: Figure 6 Relations Between the Security Modelsmentioning
confidence: 99%