Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Pattern-oriented software architecture: a system of patterns
Pattern-oriented software architecture: a system of patterns
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked Objects
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
Pattern-Oriented Software Architecture: Patterns for Resource Management
Pattern-Oriented Software Architecture: Patterns for Resource Management
Secure Group Communications Over Data Networks
Secure Group Communications Over Data Networks
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Securing publish-subscribe overlay services with EventGuard
Proceedings of the 12th ACM conference on Computer and communications security
The Secure Three-Tier Architecture Pattern
CISIS '08 Proceedings of the 2008 International Conference on Complex, Intelligent and Software Intensive Systems
A security plane for publish/subscribe based content oriented networks
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Distributed Systems Security: Issues, Processes and Solutions
Distributed Systems Security: Issues, Processes and Solutions
The Secure Pipes and Filters Pattern
DEXA '09 Proceedings of the 2009 20th International Workshop on Database and Expert Systems Application
Proceedings of the 15th Conference on Pattern Languages of Programs
Proceedings of the 15th Conference on Pattern Languages of Programs
Patterns for access control in distributed systems
Proceedings of the 14th Conference on Pattern Languages of Programs
How do architecture patterns and tactics interact? A model and annotation
Journal of Systems and Software
Hi-index | 0.00 |
Middleware typically includes a set of functions that provide services to distributed applications. To design middleware architectures, developers often employ architectural patterns --- solutions to recurring software problems. In general these patterns do not contain any security features, however, it is possible to make secured versions of them using experience or by considering security threats and countermeasures in real-life implementations. Using this inductive approach we have built up a catalog of such (compound security) patterns for middleware. They can be used by developers early in the software development life-cycle to efficiently determine a set of relevant security requirements. In this paper we continue the same line of work to secure the Wrapper Façade and Distributed Publish/Subscribe patterns, extending the inductive approach from before with a deductive approach based on a use-case driven threat analysis. We document the resulting Secure Façade compound pattern briefly, and the Secure Publish/Subscribe in more detail.