2011
DOI: 10.4018/jsse.2011070101
|View full text |Cite
|
Sign up to set email alerts
|

Organizational Patterns for Security and Dependability

Abstract: Designing secure and dependable IT systems requires a deep analysis of organizational as well as social aspects of the environment where the system will operate. Domain experts and analysts often face security and dependability (S&D) issues they have already encountered before. These concerns require the design of S&D patterns to facilitate designers when developing IT systems. This article presents the experience in designing S&D organizational patterns, which was gained in the course of an indust… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 26 publications
(38 reference statements)
0
3
0
Order By: Relevance
“…Montesi and Weber [83] described the Circuit Breaker as a pattern for preventing cascading failures by guarding service calls; this pattern is implemented as a Decorator [10] applied to the interface of the service. Asnar et al developed organizational patterns for security and dependability [84]; these patterns consider the interaction of humans and systems and, as such, are particularly interesting and different from most of the patterns discussed here. Castellanos et al [85] developed model transformations, preconditions, and postconditions to automate security and dependability design patterns.…”
Section: Specialized Patterns and Related Artifacts 61 Hybrid Patternsmentioning
confidence: 99%
“…Montesi and Weber [83] described the Circuit Breaker as a pattern for preventing cascading failures by guarding service calls; this pattern is implemented as a Decorator [10] applied to the interface of the service. Asnar et al developed organizational patterns for security and dependability [84]; these patterns consider the interaction of humans and systems and, as such, are particularly interesting and different from most of the patterns discussed here. Castellanos et al [85] developed model transformations, preconditions, and postconditions to automate security and dependability design patterns.…”
Section: Specialized Patterns and Related Artifacts 61 Hybrid Patternsmentioning
confidence: 99%
“…Since then, the development of the security pattern has become increasingly sophisticated. Researchers have developed many security patterns for different security problems [33][34][35][36].…”
Section: Security Patternsmentioning
confidence: 99%
“…Repeat this process to generate all defence plans (refer to line 4 and lines [23][24][25][26][27][28][29][30][31][32][33]. Secondly, we remove duplicate patterns from each defence plan by iterating through all defence plans (refer to lines 5-7 and lines [34][35][36][37][38][39][40][41][42][43][44][45][46][47]. Thirdly, we remove duplicate defence plans by iterating through all defence plans (refer to line 8 and lines [34][35][36][37][38][39][40][41][42][43][44][45][46][47].…”
Section: Generating and Prioritising Social Engineering Defence Plansmentioning
confidence: 99%
“…Mixed-criticality encompasses interactions of safety and security, such as mentioned by . Asnar et al [2011] present a modeling and specification framework for security requirements that have to be verified for safety-critical distributed information systems.…”
Section: Qsecurity: How Is Security Addressed In the Studies?mentioning
confidence: 99%