Proceedings of the ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software 2012
DOI: 10.1145/2384592.2384607
|View full text |Cite
|
Sign up to set email alerts
|

Growing a pattern language (for security)

Abstract: Researchers and practitioners have been successfully documenting software patterns for over two decades. But the next step-building pattern languages-has proven much more difficult. This paper describes an approach for building a large pattern language for security: an approach that can be used to create pattern languages for other software domains.We describe the mechanism of growing this pattern language: how we cataloged the security patterns from books, papers and pattern collections written by all securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(24 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…Researchers have been documenting security patterns for decades, and there have been similar efforts to increase the usability of patterns [16]. We now review and discuss the similarities of these related efforts in the security pattern domain, and how they differ from our own work.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Researchers have been documenting security patterns for decades, and there have been similar efforts to increase the usability of patterns [16]. We now review and discuss the similarities of these related efforts in the security pattern domain, and how they differ from our own work.…”
Section: Related Workmentioning
confidence: 99%
“…More recently, there has been substantial work on object-oriented design patterns [14], requirements patterns [9,15] and security patterns [10,12,16]. A security requirements pattern provides a software engineer with a reusable set of requirements to solve common security problems.…”
Section: A Pattern Languagesmentioning
confidence: 99%
See 1 more Smart Citation
“…These security threats are dangerous for financial transactions, such as fund transfer in online banking system, online bill payment, loan application, and other online transactions. Hafiz et al [13] described a pattern language for security aspects, having ninety six patterns. Although for any application, all patterns may not be applied; but based on security requirements for the case study on online banking system, five software security patterns such as Single Sign On, Check Point, Authenticator, Policy, and Secure Proxy have been considered.…”
Section: Identification and Composition Of Security Patternsmentioning
confidence: 99%
“…The CERT Program is developing a library of insider threat enterprise architectural patterns [Mundie 2012] based on the data we have collected and our previous qualitative analyses and previous work documenting security patterns [Schumacher 2006, Hafiz 2012. Our previous research has generated strong, specific hypotheses for a follow-on quantitative and explanatory investigation of the pattern "Increased Review for IP Theft by Departing Insiders," which is the subject of this paper.…”
Section: Introductionmentioning
confidence: 99%