Security patterns: 10 years later

نویسندگان

  • Koen Yskout
  • Thomas Heyman
  • Riccardo Scandariato
  • Wouter Joosen
چکیده

Reusing time-tested solutions rather than inventing ad-hoc quick fixes is a wellknown security principle. Architectural and design patterns represent proven techniques to package knowledge from software engineering experts in a reusable format. More importantly, the solution proposed by a pattern is known to be sound because it is time-tested—its strengths, weaknesses and possible drawbacks are known in advance. Therefore, in software security engineering, security patters have been considered to be a very promising means to increase the quality of secure design and make security more accessible to software engineers. However, their adoption does not live up to their potential. To understand why this is so, this paper analyzes the literature of security patterns published over the last ten years and outlines existing gaps.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzes of the effects and security function social capital in sustainable rural border areas the villages of the central city of Saravan

The objective study was to investigate the effects of social capital on sustainability security in the villages the border areas. Statistical population including the villages of the central city of Saravan are heads of households (N= 9946). 421 households (23 villages) using Cochran formula and simple random sampling were selected. for the analysis data, descriptive and inferential statistics ...

متن کامل

Associations between Dietary Patterns and Sleep Problems in Adolescent Girls: A Descriptive Cross-Sectional Study

Adolescence may be accompanied by abnormalities in menstrual cycles that result in a higher incidence of sleep problems and related psychological disorders. Dietary factors can intensify or improve sleep problems. This study aimed to evaluate the association between sleep problems and habitual dietary patterns among Iranian adolescent girls. Methods: This study was conducted in cities of Mashha...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

نسبت دگرگونی‌های منطقه‌ غرب آسیا با امنیت ملی جمهوری اسلامی ایران

Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...

متن کامل

The Conceptual Framework of Individual and Social Security Provision in Residential Complexes Based on Iranian-Islamic Foundations

Security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. For this reason, security is always of managers, planners, architects and urban designers' interest. Solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes and h...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008