Proceedings of the 16th Conference on Pattern Languages of Programs 2009
DOI: 10.1145/1943226.1943247
|View full text |Cite
|
Sign up to set email alerts
|

Goal-oriented security threat mitigation patterns

Abstract: Most attacks on computer and software systems are caused by threats to known vulnerabilities. Part of the reason is that it is difficult to possess necessary broad and deep knowledge of security related strategic knowledge to choose mitigating solutions suitable for a specific application or organization. This paper presents three patterns that use goaloriented concepts to capture knowledge of security problems and their corresponding mitigating solutions. Each pattern captures three kinds of problems, includi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 23 publications
(29 reference statements)
0
3
0
Order By: Relevance
“…Even though the success rate of this model was around 50% but it shed light to the capability to develop software that protect or at least warn people against the threats that come from internet. It is widely understood that security threats can be moderated greatly when users know about the exposures in their systems [13]. However, the required knowledge is a broad and cannot be acquired easily.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Even though the success rate of this model was around 50% but it shed light to the capability to develop software that protect or at least warn people against the threats that come from internet. It is widely understood that security threats can be moderated greatly when users know about the exposures in their systems [13]. However, the required knowledge is a broad and cannot be acquired easily.…”
Section: Related Workmentioning
confidence: 99%
“…However, the required knowledge is a broad and cannot be acquired easily. Therefore, there is an approach (goaloriented) developed by [13] to narrow the broadness and facilitate requiring knowledge. The model seems little complicated but it creates patterns for security threats and prevention, those patterns collected based on meta-data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation