2012
DOI: 10.1016/j.infsof.2012.04.001
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of the Pattern-based method for Secure Development (PbSD): A controlled experiment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 35 publications
(39 reference statements)
0
5
0
Order By: Relevance
“… Evaluating security patterns: Some research works such as (Halkidis et al, 2006), (Motii et al, 2016b) and (Duncan and de Muijnck-Hughes, 2014) have focused on the evaluation of security patterns themselves.  Evaluating the effect of security patterns on software systems: Another group of research works such as (Abramov et al, 2012b), (Smith and Williams, 2012) and (Ortiz et al, 2011) have analyzed the effectiveness of security patterns and pattern-based methods on the security of the target system. The most frequent keywords in the quality evaluation category are displayed in Table 15.…”
Section: The Quality Evaluation Categorymentioning
confidence: 99%
See 2 more Smart Citations
“… Evaluating security patterns: Some research works such as (Halkidis et al, 2006), (Motii et al, 2016b) and (Duncan and de Muijnck-Hughes, 2014) have focused on the evaluation of security patterns themselves.  Evaluating the effect of security patterns on software systems: Another group of research works such as (Abramov et al, 2012b), (Smith and Williams, 2012) and (Ortiz et al, 2011) have analyzed the effectiveness of security patterns and pattern-based methods on the security of the target system. The most frequent keywords in the quality evaluation category are displayed in Table 15.…”
Section: The Quality Evaluation Categorymentioning
confidence: 99%
“…The majority of empirical evaluations have concluded the overall usefulness of security patterns. According to Abramov et al (Abramov et al, 2012b), using a pattern-based method for secure development results in higher security and faster completion time, and it is also easier and clearer to use. The evaluation of security test patterns by Smith and Williams (Smith and Williams, 2012) concludes that using these security patterns can help novices generate similar black-box tests as experts, implying that patterns are indeed effective in disseminating expert knowledge among novice designers.…”
Section: The Focus Of Pattern Evaluations and The Consensus Regardingmentioning
confidence: 99%
See 1 more Smart Citation
“…In PbSD [2], 148 third-year undergraduate students participated in the experiment from (Security of Computers and Communication Networks) course. The students are from different departments: Information Systems Engineering (ISE) and Software Engineering (SE) programs and were divided into two groups to apply some tasks to see the security requirements comparison between PbSD with SQL and OracleâĂŹs VPD.…”
Section: Validation Of the Notationsmentioning
confidence: 99%
“…PbSD provides a well-documented experiment [2]. The authors compare their notation to specify access control policies to directly specifying the policies using SQL and Oracle's VPD.…”
Section: Validation Of the Notations (Rq3)mentioning
confidence: 99%