How do architecture patterns and tactics interact? A model and annotation
Journal of Systems and Software
Applicability of security patterns
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously carried out. The original Pipes and Filters pattern and the Parallel Pipes and Filters pattern describe those actions. We present here the Secure Pipes and Filters pattern as a secure version of the original patterns, which contains a minimal set of security mechanisms to provide a set of basic security functions. The Secure Pipes and Filters pattern includes ways to add security controls at each stage of processing, controlling that only predefined operations are applied to data streams, as well as securing data movement.