Classifying security patterns

  • Authors:
  • Eduardo B. Fernandez;Hironori Washizaki;Nobukazu Yoshioka;Atsuto Kubo;Yoshiaki Fukazawa

  • Affiliations:
  • Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL;National Institute of Informatics, Tokyo, Japan;National Institute of Informatics, Tokyo, Japan;Department of Computer Science and Engineering, Waseda University, Tokyo, Japan;Department of Computer Science and Engineering, Waseda University, Tokyo, Japan

  • Venue:
  • APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. In addition to their value for new system design, security patterns are useful to evaluate existing systems. They are also useful to compare security standards and to verify that products comply with some standard. A variety of security patterns has been developed for the construction of secure systems and catalogs of them are appearing. However, catalogs of patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. We discuss here several ways to classify patterns. We show a way to use these classifications through pattern diagrams where a designer can navigate to perform her pattern selection.