Improving the classification of security patterns

Hironori Washizaki, Eduardo B. Fernandez, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)

    Abstract

    There are a large number of security patterns encapsulating reusable solutions to recurrent security problems. However, catalogs of security patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. There is a need to conduct more precise classifications of security patterns. We analyze here ways to represent security patterns using specialized models for their precise classification. We define two new types of models, one that describes how a security pattern relates to several classification dimensions (Dimension Graph), and another that describes how security patterns relate to each other (Pattern Graphs). We show these ideas with examples from security patterns.

    Original languageEnglish
    Title of host publicationProceedings - International Workshop on Database and Expert Systems Applications, DEXA
    Pages165-170
    Number of pages6
    DOIs
    Publication statusPublished - 2009
    Event20th International Workshop on Database and Expert Systems Applications, DEXA2009 - Linz
    Duration: 2009 Aug 312009 Sep 4

    Other

    Other20th International Workshop on Database and Expert Systems Applications, DEXA2009
    CityLinz
    Period09/8/3109/9/4

    Fingerprint

    Large scale systems

    ASJC Scopus subject areas

    • Engineering(all)

    Cite this

    Washizaki, H., Fernandez, E. B., Maruyama, K., Kubo, A., & Yoshioka, N. (2009). Improving the classification of security patterns. In Proceedings - International Workshop on Database and Expert Systems Applications, DEXA (pp. 165-170). [5337198] https://doi.org/10.1109/DEXA.2009.79

    Improving the classification of security patterns. / Washizaki, Hironori; Fernandez, Eduardo B.; Maruyama, Katsuhisa; Kubo, Atsuto; Yoshioka, Nobukazu.

    Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. 2009. p. 165-170 5337198.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Washizaki, H, Fernandez, EB, Maruyama, K, Kubo, A & Yoshioka, N 2009, Improving the classification of security patterns. in Proceedings - International Workshop on Database and Expert Systems Applications, DEXA., 5337198, pp. 165-170, 20th International Workshop on Database and Expert Systems Applications, DEXA2009, Linz, 09/8/31. https://doi.org/10.1109/DEXA.2009.79
    Washizaki H, Fernandez EB, Maruyama K, Kubo A, Yoshioka N. Improving the classification of security patterns. In Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. 2009. p. 165-170. 5337198 https://doi.org/10.1109/DEXA.2009.79
    Washizaki, Hironori ; Fernandez, Eduardo B. ; Maruyama, Katsuhisa ; Kubo, Atsuto ; Yoshioka, Nobukazu. / Improving the classification of security patterns. Proceedings - International Workshop on Database and Expert Systems Applications, DEXA. 2009. pp. 165-170
    @inproceedings{181aa85aab9b4f38958905c4be2204ab,
    title = "Improving the classification of security patterns",
    abstract = "There are a large number of security patterns encapsulating reusable solutions to recurrent security problems. However, catalogs of security patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. There is a need to conduct more precise classifications of security patterns. We analyze here ways to represent security patterns using specialized models for their precise classification. We define two new types of models, one that describes how a security pattern relates to several classification dimensions (Dimension Graph), and another that describes how security patterns relate to each other (Pattern Graphs). We show these ideas with examples from security patterns.",
    author = "Hironori Washizaki and Fernandez, {Eduardo B.} and Katsuhisa Maruyama and Atsuto Kubo and Nobukazu Yoshioka",
    year = "2009",
    doi = "10.1109/DEXA.2009.79",
    language = "English",
    isbn = "9780769537634",
    pages = "165--170",
    booktitle = "Proceedings - International Workshop on Database and Expert Systems Applications, DEXA",

    }

    TY - GEN

    T1 - Improving the classification of security patterns

    AU - Washizaki, Hironori

    AU - Fernandez, Eduardo B.

    AU - Maruyama, Katsuhisa

    AU - Kubo, Atsuto

    AU - Yoshioka, Nobukazu

    PY - 2009

    Y1 - 2009

    N2 - There are a large number of security patterns encapsulating reusable solutions to recurrent security problems. However, catalogs of security patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. There is a need to conduct more precise classifications of security patterns. We analyze here ways to represent security patterns using specialized models for their precise classification. We define two new types of models, one that describes how a security pattern relates to several classification dimensions (Dimension Graph), and another that describes how security patterns relate to each other (Pattern Graphs). We show these ideas with examples from security patterns.

    AB - There are a large number of security patterns encapsulating reusable solutions to recurrent security problems. However, catalogs of security patterns are not enough because the designer does not know when and where to apply them, especially in a large complex system. There is a need to conduct more precise classifications of security patterns. We analyze here ways to represent security patterns using specialized models for their precise classification. We define two new types of models, one that describes how a security pattern relates to several classification dimensions (Dimension Graph), and another that describes how security patterns relate to each other (Pattern Graphs). We show these ideas with examples from security patterns.

    UR - http://www.scopus.com/inward/record.url?scp=73849138269&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=73849138269&partnerID=8YFLogxK

    U2 - 10.1109/DEXA.2009.79

    DO - 10.1109/DEXA.2009.79

    M3 - Conference contribution

    AN - SCOPUS:73849138269

    SN - 9780769537634

    SP - 165

    EP - 170

    BT - Proceedings - International Workshop on Database and Expert Systems Applications, DEXA

    ER -