2012 Second IEEE International Workshop on Requirements Patterns (RePa) 2012
DOI: 10.1109/repa.2012.6359975
|View full text |Cite
|
Sign up to set email alerts
|

Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns

Abstract: Despite the abundance of information security guidelines, system developers have difficulties implementing technical solutions that are reasonably secure. Security patterns are one possible solution to help developers reuse security knowledge. The challenge is that it takes experts to develop security patterns. To address this challenge, we need a framework to identify and assess patterns and pattern application practices that are accessible to non-experts. In this paper, we narrowly define what we mean by pat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 33 publications
(82 reference statements)
0
1
0
Order By: Relevance
“…More recently, there has been substantial work on object-oriented design patterns [14], requirements patterns [9,15] and security patterns [10,12,16]. A security requirements pattern provides a software engineer with a reusable set of requirements to solve common security problems.…”
Section: A Pattern Languagesmentioning
confidence: 99%
“…More recently, there has been substantial work on object-oriented design patterns [14], requirements patterns [9,15] and security patterns [10,12,16]. A security requirements pattern provides a software engineer with a reusable set of requirements to solve common security problems.…”
Section: A Pattern Languagesmentioning
confidence: 99%