Classifying security patterns

Eduardo B. Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Atsuto Kubo, Yoshiaki Fukazawa

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)

    Abstract

    Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. In addition to their value for new system design, security patterns are useful to evaluate existing systems. They are also useful to compare security standards and to verify that products comply with some standard. A variety of security patterns has been developed for the construction of secure systems and catalogs of them are appearing. However, catalogs of patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. We discuss here several ways to classify patterns. We show a way to use these classifications through pattern diagrams where a designer can navigate to perform her pattern selection.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Pages342-347
    Number of pages6
    Volume4976 LNCS
    DOIs
    Publication statusPublished - 2008
    Event10th Asia Pacific Conference on Web Technology, APWeb 2008 - Shenyang
    Duration: 2008 Apr 262008 Apr 28

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4976 LNCS
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    Other10th Asia Pacific Conference on Web Technology, APWeb 2008
    CityShenyang
    Period08/4/2608/4/28

    Fingerprint

    Systems analysis
    Large scale systems
    Guidelines
    System Design
    Join
    Complex Systems
    Diagram
    Classify
    Verify
    Evaluate
    Evaluation

    Keywords

    • Pattern classification
    • Secure system development
    • Security patterns
    • System architecture

    ASJC Scopus subject areas

    • Computer Science(all)
    • Biochemistry, Genetics and Molecular Biology(all)
    • Theoretical Computer Science

    Cite this

    Fernandez, E. B., Washizaki, H., Yoshioka, N., Kubo, A., & Fukazawa, Y. (2008). Classifying security patterns. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4976 LNCS, pp. 342-347). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4976 LNCS). https://doi.org/10.1007/978-3-540-78849-2_35

    Classifying security patterns. / Fernandez, Eduardo B.; Washizaki, Hironori; Yoshioka, Nobukazu; Kubo, Atsuto; Fukazawa, Yoshiaki.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4976 LNCS 2008. p. 342-347 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4976 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fernandez, EB, Washizaki, H, Yoshioka, N, Kubo, A & Fukazawa, Y 2008, Classifying security patterns. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4976 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4976 LNCS, pp. 342-347, 10th Asia Pacific Conference on Web Technology, APWeb 2008, Shenyang, 08/4/26. https://doi.org/10.1007/978-3-540-78849-2_35
    Fernandez EB, Washizaki H, Yoshioka N, Kubo A, Fukazawa Y. Classifying security patterns. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4976 LNCS. 2008. p. 342-347. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-78849-2_35
    Fernandez, Eduardo B. ; Washizaki, Hironori ; Yoshioka, Nobukazu ; Kubo, Atsuto ; Fukazawa, Yoshiaki. / Classifying security patterns. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4976 LNCS 2008. pp. 342-347 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{f05c24c2fa8b45069415383e5b97681d,
    title = "Classifying security patterns",
    abstract = "Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. In addition to their value for new system design, security patterns are useful to evaluate existing systems. They are also useful to compare security standards and to verify that products comply with some standard. A variety of security patterns has been developed for the construction of secure systems and catalogs of them are appearing. However, catalogs of patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. We discuss here several ways to classify patterns. We show a way to use these classifications through pattern diagrams where a designer can navigate to perform her pattern selection.",
    keywords = "Pattern classification, Secure system development, Security patterns, System architecture",
    author = "Fernandez, {Eduardo B.} and Hironori Washizaki and Nobukazu Yoshioka and Atsuto Kubo and Yoshiaki Fukazawa",
    year = "2008",
    doi = "10.1007/978-3-540-78849-2_35",
    language = "English",
    isbn = "3540788484",
    volume = "4976 LNCS",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    pages = "342--347",
    booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

    }

    TY - GEN

    T1 - Classifying security patterns

    AU - Fernandez, Eduardo B.

    AU - Washizaki, Hironori

    AU - Yoshioka, Nobukazu

    AU - Kubo, Atsuto

    AU - Fukazawa, Yoshiaki

    PY - 2008

    Y1 - 2008

    N2 - Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. In addition to their value for new system design, security patterns are useful to evaluate existing systems. They are also useful to compare security standards and to verify that products comply with some standard. A variety of security patterns has been developed for the construction of secure systems and catalogs of them are appearing. However, catalogs of patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. We discuss here several ways to classify patterns. We show a way to use these classifications through pattern diagrams where a designer can navigate to perform her pattern selection.

    AB - Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. In addition to their value for new system design, security patterns are useful to evaluate existing systems. They are also useful to compare security standards and to verify that products comply with some standard. A variety of security patterns has been developed for the construction of secure systems and catalogs of them are appearing. However, catalogs of patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. We discuss here several ways to classify patterns. We show a way to use these classifications through pattern diagrams where a designer can navigate to perform her pattern selection.

    KW - Pattern classification

    KW - Secure system development

    KW - Security patterns

    KW - System architecture

    UR - http://www.scopus.com/inward/record.url?scp=43749110915&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=43749110915&partnerID=8YFLogxK

    U2 - 10.1007/978-3-540-78849-2_35

    DO - 10.1007/978-3-540-78849-2_35

    M3 - Conference contribution

    AN - SCOPUS:43749110915

    SN - 3540788484

    SN - 9783540788485

    VL - 4976 LNCS

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 342

    EP - 347

    BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    ER -