Applicability of security patterns

  • Authors:
  • Roberto Ortiz;Santiago Moral-García;Santiago Moral-Rubio;Belén Vela;Javier Garzás;Eduardo Fernández-Medina

  • Affiliations:
  • S21SecLabs-SOC. Group S21Sec Gestión S.A., Madrid, Spain;Kybele Group. Dep. of Computer Languages and Systems II, University Rey Juan Carlos, Madrid, Spain;Dep. Logical Security, BBVA, Madrid, Spain;Kybele Group. Dep. of Computer Languages and Systems II, University Rey Juan Carlos, Madrid, Spain;Kybele Group. Dep. of Computer Languages and Systems II, University Rey Juan Carlos, Madrid, Spain and Kybele Consulting, Madrid;GSyA Research Group, Dep. of Information Technologies and Systems, University of Castilla-La Mancha, Paseo de la Universidad, Ciudad Real, Spain

  • Venue:
  • OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Information Security has become one of the fundamental mainstays in organizations owing to the ever-increasing cyber attacks against them in recent years. Both the designers of security mechanisms and the security engineers therefore need reliable security solutions to minimize the impact of the attacks on an organization's systems. Good mechanisms for solving these deficiencies are security patterns, which present a reliable and tested scheme to deal with recurring security problems. In this paper, we perform an analysis of some of the most important works that describe security patterns. Our main objective is to verify their applicability for the analysis and design of secure architectures in real and complex environments. Finally, and after presenting the detected shortcomings of the existing security patterns, we show which features should be incorporated into the patterns to be applicable in the field of information security engineering related to the development of secure architectures.