Selecting Security Patterns that Fulfill Security Requirements

Conference paper


Weiss, Michael and Mouratidis, Haralambos 2008. Selecting Security Patterns that Fulfill Security Requirements. 16th IEEE International Conference on Requirements Engineering. Barcelona, Spain 08 - 12 Sep 2008
AuthorsWeiss, Michael and Mouratidis, Haralambos
TypeConference paper
Abstract

Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements.

Keywordssoftware engineering; Secure information systems
Year2008
Conference16th IEEE International Conference on Requirements Engineering
Accepted author manuscript
License
CC BY-ND
Publication dates
PrintSep 2008
Publication process dates
Deposited07 Dec 2009
Web address (URL)http://doi.ieeecomputersociety.org/10.1109/RE.2008.32
http://hdl.handle.net/10552/426
Additional information

Citation:
Weiss, M., Mouratidis, H. (2008) Selecting Security Patterns that Fulfill Security Requirements., Proceedings of the 16th IEEE International Conference on Requirements Engineering, IEEE Computer Society, pp. 169-172.

Permalink -

https://repository.uel.ac.uk/item/864yv

Download files


Accepted author manuscript
  • 85
    total views
  • 285
    total downloads
  • 1
    views this month
  • 5
    downloads this month

Export as