2021
DOI: 10.3390/info12010036
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Literature Review of Security Pattern Research

Abstract: Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communicat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 199 publications
0
2
0
Order By: Relevance
“…Moreover, these applications are rather complex, and this makes it difficult to exploit them to "unit test" the implemented analyses. We instead decided to implement a mock microservice application that focused on security and that would adhere to well-known architectural security patterns [46,47]. The idea was to have a microservice application without any security smells and to artificially introduce them to test the analyses.…”
Section: Controlled Experimentsmentioning
confidence: 99%
“…Moreover, these applications are rather complex, and this makes it difficult to exploit them to "unit test" the implemented analyses. We instead decided to implement a mock microservice application that focused on security and that would adhere to well-known architectural security patterns [46,47]. The idea was to have a microservice application without any security smells and to artificially introduce them to test the analyses.…”
Section: Controlled Experimentsmentioning
confidence: 99%
“…Conventionally, resources in cloud computing are located in a huge data storage center and are managed and controlled by a third party, who offers computing infrastructures for the cloud users to be used by anyone from anywhere via the Internet [3]. Cloud computing presents a huge resource that can be reached on demand and distributed over the Internet [4][5][6][7][8]. Figure 1 illustrates the cloud computing model environment for cloud services allow users (including persons, businesses, and customers) to exploit software and hardware that are managed at remote locations by third parties.…”
Section: Introduction 1cloud Computingmentioning
confidence: 99%