A Practical Evaluation of Security Patterns
نویسندگان
چکیده
Software security has attracted the attention of researchers in the area of security during the last years due to the proven fact that most attacks to businesses and organizations exploit software vulnerabilities. Moreover, the need to impose some level of security already at the design phase has been recognized. Therefore, software design patterns with the target of enhancing the security of software systems, already at design, have been proposed. These patterns are called security patterns. In this paper we evaluate common security patterns with respect to the STRIDE model of attacks by examining the attacks performed to two different systems: one without security patterns and one properly using them.
منابع مشابه
Static Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network
This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....
متن کاملSecurity Patterns: Comparing Modeling Approaches
Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by designers with little knowledge of securi...
متن کاملEvaluation of urinary enzymes in newborns treated with gentamicin
Objective(s): In recent years, there has been an increasing amount of study on early diagnosis of kidney injury through sensitive and specific biomarkers. We examined the practical applicability of the urinary levels of NAG (N-acetyl-β-D-glucosaminidase), AP (alkaline phosphatase), and LDH (lactate dehydrogenase) as renal dysfunction screening biomarkers in full and pre-term newborns treated wi...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملNational Resilience As A Determinant Of National Security Of Ukraine
The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006