A qualitative analysis of software security patterns
نویسندگان
چکیده
Software security, which has attracted the interest of the industrial and research community during the last years, aims at preventing security problems by building software without the so-called security holes. One way to achieve this goal is to apply specific patterns in software architecture. In the same way that the well-known design patterns for building well-structured software have been defined, a new kind of patterns called security patterns have emerged. These patterns enable us to incorporate a level of security already at the design phase of a software system. There exists no strict set of rules that can be followed in order to develop secure software. However, a number of guidelines have already appeared in the literature. Furthermore, the key problems in building secure software and major threat categories for a software system have been identified. An attempt to evaluate known security patterns based on how well they follow each principle, how well they encounter with possible problems in building secure software and for which of the threat categories they do take care of, is performed in this paper. Thirteen security patterns were evaluated based on these three sets of criteria. The ability of some of these patterns to enhance the security of the design of a software system is also examined by an illustrative example of fortifying a published design. a 2006 Elsevier Ltd. All rights reserved.
منابع مشابه
An Analysis of the Patterns of Policymaking in Iraq’s National Security During the Period of the Ba’ath Party’s Rule
Relying on its partisan principles and values, the Ba’athist regime– the period when Saddam Hussein was in charge in Iraq– sought a powerful government. Not respecting and believing in ethnical and sectarian differences and seeking the realization of national unity, Saddam tried to regulate security policies in a way in which he could assimilate the differing Iraqi society, using the policies o...
متن کاملDeveloping a Model of Internalof Internal Organizational Factors Effective on Tacit Knowledge Management of Social Security Organization: Grounded Theory Approach
Introduction: The need to design and establish an integrated knowledge management system is one of the strategic issues of the social security organization. The present research was conducted with the aim of developing a model of Internal organizational factors effective on tacit knowledge management of social security organization with the Grounded Theory approach. Method: The current study i...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملA Qualitative Evaluation of Security Patterns
Software Security has received a lot of attention during the last years. It aims at preventing security problems by building software without the socalled security holes. One of the ways to do this is to apply specific patterns in software architecture. In the same way that the well-known design patterns for building well-structured software have been used, a new kind of patterns, called securi...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 25 شماره
صفحات -
تاریخ انتشار 2006