2020
DOI: 10.1016/j.cola.2019.100938
|View full text |Cite
|
Sign up to set email alerts
|

Security patterns: A systematic mapping study

Abstract: Security patterns are a means to encapsulate and communicate proven security solutions. They are wellestablished approaches for introducing security into the software development process. Our objective is to explore the research efforts on security patterns and discuss the current state of the art. This study will serve as a guideline for researchers, practitioners, and teachers interested in this field. We have conducted a systematic mapping study of relevant literature from 1997 until the end of 2017 and ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 66 publications
0
4
0
Order By: Relevance
“…The research on security pattern is an active and growing field across the globe [14]. Much research has been done on the secure design pattern classification, but little research has considered selecting appropriate secure design patterns for a given problem.…”
Section: Discussionmentioning
confidence: 99%
“…The research on security pattern is an active and growing field across the globe [14]. Much research has been done on the secure design pattern classification, but little research has considered selecting appropriate secure design patterns for a given problem.…”
Section: Discussionmentioning
confidence: 99%
“…In a similar context, the research by Behmanesh et al (2020) reports on the identification and classification of tele-orthopedic applications and services, together with a general description of trends in this field. Strictly in the field of technology and information, the following studies use systematic mapping: Khan et al (2021), who try to identify, categorize, and present a complete general description of the approaches, techniques, and tools used in election predictions on Twitter; Rachad and Idri (2020), who aim to provide an overview of the use of machine learning (ML) techniques in the design and development of mobile applications; Jafari and Rasoolzadegan (2020), who explore security patterns as a means of encapsulating and communicating tested security solutions and introduce security into the development process. Moreover, Belmonte et al (2019) present an overview of automatic tasks based on the concept of unmanned aerial vehicles (UAV); Zakari et al (2019) present a study of software fault localization (SFL) in order to determine the general productivity of investigation, demography, and trends, as well as to classify existing techniques; Cravero et al (2018) offer an overview of how IoT (Internet of Things) technologies and BigData can help oenologists to manage and optimize wine production, and how the components of the computer architectures used can be determined; Haghighatkhah et al (2017) propose a classification and analysis of the literature related with software engineering in the motor car industry; and Gabriel et al (2016) analyze the existing digital tools to support creativity in organizations.…”
Section: Systematic Mapping Studymentioning
confidence: 99%
“…We restrict our research to the original "Gang-of-four" patterns, exclusing other developments in patterns such as nano patterns in programming ccode, 12 patterns for different computing models, 13 or security patterns. 14 Our main contribution is that we reason, in a systematic way, about how to compare possible implementations of design patterns. As far as we know, this has not been done before.…”
Section: Introductionmentioning
confidence: 99%
“…We restrict our research to the original “Gang‐of‐four” patterns, exclusing other developments in patterns such as nano patterns in programming ccode, 12 patterns for different computing models, 13 or security patterns 14 …”
Section: Introductionmentioning
confidence: 99%