An ontology-based approach to security pattern selection

Article English OPEN
Guan, H; Yang, H; Wang, J;

Usually, the security requirements are addressed by abstracting the security problems arising in a specific context and providing a well proven solution to them. Security patterns incorporating proven security expertise solution to the recurring security problems have b... View more
  • References (42)
    42 references, page 1 of 5

    [1] M. Schumacher. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Berlin, Germany: Springer-Verlag Berlin Heidelberg, 2003.

    [2] M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. UK: John Wiley & Sons, 2006.

    [3] M. Bunke, R. Koschke and K. Sohr. Organizing security patterns related to security and pattern recognition requirements. International Journal on Advances in Security, vol. 5, no. 1 and 2, pp. 46-67, 2012.

    [4] E. Gamma, R. Helm, R. Johnson and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Boston, USA: Pearson Education, 1994.

    [5] T. Heyman, K. Yskout, R. Scandariato and W. Joosen. An analysis of the security patterns landscape. In Proceedings of the Third International Workshop on Software Engineering for Secure Systems, IEEE Computer Society, Minneapolis, MN, pp. 3, 2007.

    [6] J. Viega and G. McGraw. Building Secure Software: How to Avoid Security Problems the Right Way. Boston, USA: Addison-Wesley Professional, 2001.

    [7] B. H. Cheng, S. Konrad, L. A. Campbell and R. Wassermann. Using security patterns to model and analyse security requirements. IEEE Workshop on Requirements for High Assurance Systems, pp. 13-22, 2003.

    [8] D. M. Kienzle and M. C. Elder. Final Technical Report: Security Patterns for Web Application Development, University of Virginia, USA, 2002.

    [9] D. M. Kienzle, M. C. Elder, D. Tyree and J. Edwards-Hewitt. Security Patterns Repository Version 1.0. DARPA, Washington DC, 2002.

    [10] B. Blakley and C. Heath. Security Design Patterns Technical Guide - Version 1, the Open Group, UK, 2004.

  • Metrics
Share - Bookmark