2014 Ninth International Conference on Availability, Reliability and Security 2014
DOI: 10.1109/ares.2014.71
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns

Abstract: A Security Pattern encapsulates security design expertise that addresses recurring information security problems in the form of a credentialed solution. It also presents potential problems and trade-offs in its application. This paper proposes a novel c l a s s i f i c a t i o n model f o r security patterns. Based on our review of more than one hundred security patterns, we categorize security patterns according to the type of vulnerability they address and also identify similar or identical patterns with dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 6 publications
(7 reference statements)
0
12
0
Order By: Relevance
“…Some other works such as (Jafari and Rasoolzadegan, 2016) and (Fernandez and Ortega-Arjona, 2009) have focused on the idea of adding security capabilities to previously un-secure design patterns.  Pattern languages and the Classification (or Categorization) of patterns: Developments in this regard include attempts at classifying security patterns (Anand et al, 2014), (Fernandez et al, 2008) or presenting new pattern languages (Hafiz et al, 2012), (Li et al, 2013), (Mundie et al, 2012). It's worth noting that a pattern language is not just a catalog of patterns, but also a system to guide the designers in using multiple patterns to design secure systems (Hafiz, 2013).…”
Section: The Pattern Development Categorymentioning
confidence: 99%
See 1 more Smart Citation
“…Some other works such as (Jafari and Rasoolzadegan, 2016) and (Fernandez and Ortega-Arjona, 2009) have focused on the idea of adding security capabilities to previously un-secure design patterns.  Pattern languages and the Classification (or Categorization) of patterns: Developments in this regard include attempts at classifying security patterns (Anand et al, 2014), (Fernandez et al, 2008) or presenting new pattern languages (Hafiz et al, 2012), (Li et al, 2013), (Mundie et al, 2012). It's worth noting that a pattern language is not just a catalog of patterns, but also a system to guide the designers in using multiple patterns to design secure systems (Hafiz, 2013).…”
Section: The Pattern Development Categorymentioning
confidence: 99%
“…(Ponde et al, 2016), (Hafiz et al, 2007) Vulnerability OWASP's vulnerability classification. (Anand et al, 2014) This section includes our analyses and discussions regarding the results in section 3. Instead of presenting a separate discussion for each of the 9 research questions, we have categorized our discussion into 4 subsections which collectively covers the entire results of this study.…”
Section: Classification Criteria Sample Values Examplesmentioning
confidence: 99%
“…(Bunke et al, 2012), but the notions of attacks or vulnerabilities are not mentioned. Vulnerabilities are taken into consideration for pattern classification in (Anand et al, 2014;Alvi and Zulkernine, 2011). This gives another point of view helping designers in the choice of patterns to fix software vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…)., by vulnerabilities (Anand et al, 2014;Alvi and Zulkernine, 2011) or by attacks (Wiesauer and Sametinger, 2009;Alvi and Zulkernine, 2011). Despite the improvements in the pattern choice brought by these classifications, several issues still remain open.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the benefits brought by these studies, this kind of classification remains insufficient because security principles are mostly abstract and lead to imprecise categories from which designers still have to take a decision on the Research supported by the industrial chair on Digital Confidence (http://confiance-numerique.clermont-universite.fr/index-en.html) patterns to implement. This is why other works proposed to classify security patterns according to vulnerabilities [6], [4]. For a given security pattern, these classifications provide the vulnerabilities that are mitigated with the application of this pattern.…”
Section: Introductionmentioning
confidence: 99%