A Qualitative Evaluation of Security Patterns

نویسندگان

  • Spyros T. Halkidis
  • Alexander Chatzigeorgiou
  • George Stephanides
چکیده

Software Security has received a lot of attention during the last years. It aims at preventing security problems by building software without the socalled security holes. One of the ways to do this is to apply specific patterns in software architecture. In the same way that the well-known design patterns for building well-structured software have been used, a new kind of patterns, called security patterns have emerged. The way to build secure software is still vague, but guidelines for this have already appeared in the literature. Furthermore, the key problems in building secure software have been mentioned. Finally, threat categories for a software system have been identified. Based on these facts, it would be useful to evaluate known security patterns based on how well they follow each guideline, how they encounter with possible problems in building secure software and for which of the threat categories they do take care of.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Conceptual Framework of Individual and Social Security Provision in Residential Complexes Based on Iranian-Islamic Foundations

Security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. For this reason, security is always of managers, planners, architects and urban designers' interest. Solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes and h...

متن کامل

An Analysis of the Patterns of Policymaking in Iraq’s National Security During the Period of the Ba’ath Party’s Rule

Relying on its partisan principles and values, the Ba’athist regime– the period when Saddam Hussein was in charge in Iraq– sought a powerful government. Not respecting and believing in ethnical and sectarian differences and seeking the realization of national unity, Saddam tried to regulate security policies in a way in which he could assimilate the differing Iraqi society, using the policies o...

متن کامل

Static Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

متن کامل

Developing a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach

Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004