TY - JOUR
T1 - Systematic literature review of security pattern research
AU - Washizaki, Hironori
AU - Xia, Tian
AU - Kamata, Natsumi
AU - Fukazawa, Yoshiaki
AU - Kanuka, Hideyuki
AU - Kato, Takehisa
AU - Yoshino, Masayuki
AU - Okubo, Takao
AU - Ogata, Shinpei
AU - Kaiya, Haruhiko
AU - Hazeyama, Atsuo
AU - Tanaka, Takafumi
AU - Yoshioka, Nobukazu
AU - Priyalakshmi, G.
N1 - Funding Information:
Funding: This research was supported by the SCAT Research Grant, the MEXT enPiT-Pro Smart SE: Smart Systems and Services innovative professional Education program, the JSPS KAKENHI grant number 16H02804, the JSPS KAKENHI grant number 17K00475, the JST-Mirai Program grant number JP18077318, and the JST-Mirai Program grant number JP20319852.
Publisher Copyright:
© 2021 by the authors. Licensee MDPI, Basel, Switzerland.
PY - 2021/1
Y1 - 2021/1
N2 - Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.
AB - Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.
KW - Security patterns
KW - Software patterns
KW - Systematic literature review (SLR)
UR - http://www.scopus.com/inward/record.url?scp=85099813256&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099813256&partnerID=8YFLogxK
U2 - 10.3390/info12010036
DO - 10.3390/info12010036
M3 - Article
AN - SCOPUS:85099813256
SN - 2078-2489
VL - 12
SP - 1
EP - 27
JO - Information (Switzerland)
JF - Information (Switzerland)
IS - 1
M1 - 36
ER -