Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements.

-- DanielAmyot - 08 Jul 2010


FormForVirtualLibrary edit

Title Selecting Security Patterns that Fulfill Security Requirements
Authors M. Weiss and H. Mouratidis
Type Conference
Conference/Journal Title 16th IEEE Int. Requirements Engineering Conf. (RE'08)
Publisher IEEE CS
Month September
Year 2008
Pages 169-172
DOI 10.1109/RE.2008.32
Keywords Security Patterns, Security Requirements, GRL, evaluation
Topic revision: r1 - 08 Jul 2010, DanielAmyot
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding Foswiki? Send feedback