TY - GEN
T1 - Taxonomy and literature survey of security pattern research
AU - Washizaki, Hironori
AU - Xia, Tian
AU - Kamata, Natsumi
AU - Fukazawa, Yoshiaki
AU - Ogata, Shinpei
AU - Kaiya, Haruhiko
AU - Tanaka, Takafumi
AU - Kanuka, Hideyuki
AU - Yamaoto, Dan
AU - Yoshino, Masayuki
AU - Okubo, Takao
AU - Kato, Takehisa
AU - Hazeyama, Atsuo
AU - Yoshioka, Nobukazu
AU - Priyalakshmi, G.
N1 - Publisher Copyright:
© 2018 IEEE
PY - 2019/1/31
Y1 - 2019/1/31
N2 - Security patterns encapsulate security-related problems and solutions that recur in certain contexts for secure software system development and operations. Almost 500 security patterns have been proposed since the late 1990s. Technical investigations on their applications have advanced implementation, but the direction, overall picture, and significant technical challenges remain unclear. In this study, we propose a taxonomy for security pattern research by conducting a systematic literature review. Over 200 papers are categorized based on the taxonomy. The taxonomy is expected to guide practitioners to choose existing security pattern methods and tools. In addition, the taxonomy and the survey results should support communications among practitioners and researchers, and improve the quality of security pattern research and the effectiveness of security patterns.
AB - Security patterns encapsulate security-related problems and solutions that recur in certain contexts for secure software system development and operations. Almost 500 security patterns have been proposed since the late 1990s. Technical investigations on their applications have advanced implementation, but the direction, overall picture, and significant technical challenges remain unclear. In this study, we propose a taxonomy for security pattern research by conducting a systematic literature review. Over 200 papers are categorized based on the taxonomy. The taxonomy is expected to guide practitioners to choose existing security pattern methods and tools. In addition, the taxonomy and the survey results should support communications among practitioners and researchers, and improve the quality of security pattern research and the effectiveness of security patterns.
KW - Security patterns
KW - Systematic Literature Review
UR - http://www.scopus.com/inward/record.url?scp=85062890060&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85062890060&partnerID=8YFLogxK
U2 - 10.1109/IISA.2018.8631465
DO - 10.1109/IISA.2018.8631465
M3 - Conference contribution
AN - SCOPUS:85062890060
T3 - 2018 IEEE Conference on Application, Information and Network Security, AINS 2018
SP - 87
EP - 92
BT - 2018 IEEE Conference on Application, Information and Network Security, AINS 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 IEEE Conference on Application, Information and Network Security, AINS 2018
Y2 - 21 November 2018 through 22 November 2018
ER -