2007
DOI: 10.1109/ms.2007.114
|View full text |Cite
|
Sign up to set email alerts
|

Organizing Security Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
65
0
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 97 publications
(66 citation statements)
references
References 2 publications
0
65
0
1
Order By: Relevance
“…It should be noted that a multidimensional space can be aligned with cell divisions in Trowbridge et al (2004), Hafiz et al (2007), and even German and Cowen, (2000) without hier archical grouping. From the users' perspective, reducing orthogonal classifications to a single hierarchy achieves little and hinders the exploration of relationships along different dimensions.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It should be noted that a multidimensional space can be aligned with cell divisions in Trowbridge et al (2004), Hafiz et al (2007), and even German and Cowen, (2000) without hier archical grouping. From the users' perspective, reducing orthogonal classifications to a single hierarchy achieves little and hinders the exploration of relationships along different dimensions.…”
Section: Related Workmentioning
confidence: 99%
“…The 110 patterns classified fall into only two categories: integration and application, and three concerns: data, function, and network. Hafiz et al (2007) identify four potential classification dimensions: protection type, application context, threat, and Trowbridge's viewpoints. In the end they proposed a hierarchy based on application context followed by threat.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Like design patterns, which are also called GoF patterns [6], security patterns can be applied to implementing and structuring software systems, but they can also model security issues and security processes in enterprises such as "Enterprise Architecture Management Patterns" [4]. Based on this heterogeneity, the classification of security patterns is an important and often discussed issue [24,28,8,9]. Different approaches exist, some describe basic topologies like separating the patterns in application domains (e.g., software, enterprise management), others describe complex layered structures.…”
Section: Introductionmentioning
confidence: 99%
“…Different approaches exist, some describe basic topologies like separating the patterns in application domains (e.g., software, enterprise management), others describe complex layered structures. In this paper, we will have a closer look on patterns that describe how to implement a specific security feature, i.e., so-called structural patterns [8].…”
Section: Introductionmentioning
confidence: 99%