Software Engineering for Secure Systems
DOI: 10.4018/9781615208371.ch002
|View full text |Cite
|
Sign up to set email alerts
|

Using Security Patterns to Develop Secure Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
18
0

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 11 publications
(15 reference statements)
0
18
0
Order By: Relevance
“…In Fernandez, Yoshioka, Washizaki & Jürjens (2007) we defined some requirements for such a methodology. Principles to build secure systems have been defined in some classical papers (Saltzer & Schroeder, 1975) and textbooks (Viega & McGraw, 2001), patterns may apply them implicitly.…”
Section: Secure Software Development Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…In Fernandez, Yoshioka, Washizaki & Jürjens (2007) we defined some requirements for such a methodology. Principles to build secure systems have been defined in some classical papers (Saltzer & Schroeder, 1975) and textbooks (Viega & McGraw, 2001), patterns may apply them implicitly.…”
Section: Secure Software Development Methodologymentioning
confidence: 99%
“…We found that they have many common and complementary aspects and we proposed a combination of them in Fernandez, Yoshioka, Washizaki & Jürjens, (2007). This methodology appears to satisfy all the requirements described above, although it is still not complete.…”
mentioning
confidence: 99%
“…Their approach includes guidelines for integrating security from the requirements phase through analysis, design, and implementation. In a more recent paper, Fernandez et al [39] proposed a combination of three similar methodologies into a single unified approach to build secure systems using patterns, but did not integrate them into an industry-recognized Secure SDL.…”
Section: Related Workmentioning
confidence: 99%
“…The template is augmented with UML notations for the solution and with formal artifacts for the requirement properties. Recently [4] presented an overview and new directions on how security patterns are used in the whole aspects of software systems from domain analysis to the infrastructures.…”
Section: Related Workmentioning
confidence: 99%