2015
DOI: 10.1016/j.infsof.2014.09.001
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive pattern-oriented approach to engineering security methodologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 45 publications
0
20
0
1
Order By: Relevance
“…In this section, we provide background on security methodologies and our previously proposed approach to engineering them. Some of the material (especially in Section 2.1) is taken from Uzunov et al, with adaptation where appropriate. We conclude the section with an overview of our proposal for assessing and improving security methodology quality in this paper—which, as explained in the Introduction, is elaborated in the context of the aforementioned security methodology engineering approach.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we provide background on security methodologies and our previously proposed approach to engineering them. Some of the material (especially in Section 2.1) is taken from Uzunov et al, with adaptation where appropriate. We conclude the section with an overview of our proposal for assessing and improving security methodology quality in this paper—which, as explained in the Introduction, is elaborated in the context of the aforementioned security methodology engineering approach.…”
Section: Preliminariesmentioning
confidence: 99%
“…Over the last two decades, a number of researchers have come to regard fixed, “one‐size‐fits‐all” development methodologies as inadequate and unable to meet the needs of different organizations—a realization that has given impetus to the field of (Situational) Method Engineering—(S)ME . Similar arguments can be adduced with respect to security methodologies (see Uzunov et al), which has led to the proposal of a comprehensive, pattern‐oriented approach to engineering security methodologies in Uzunov et al inspired by a number of SME ideas.…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…Yoder and Barcalow presented seven security patterns, which are applied to various software development issues [24]. A number of other varieties of security patterns are also available in the literature [19] [20] [22].…”
Section: Introductionmentioning
confidence: 99%