Skip to main content

Security Design Patterns in the MASTER Workbench

  • Chapter
  • First Online:
Cyberpatterns

Abstract

We describe the pattern-related aspects of the prototype Protection and Assessment (P&A) Workbench that was developed as part of the MASTER EU 7th Framework collaborative research project. The Workbench supports a model-driven design process within the overall MASTER methodology. It includes a Protection and Regulatory Model (PRM) tool that is a step towards turning the Workbench into an ‘organisational memory’ for design practices that accumulates and improves over time. PRMs are essentially control process design patterns that incorporate proven strategies in a re-usable form, saving time and improving quality and consistency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This work was supported by EU FP7 project MASTER (Grant Agreement No. 216917).

References

  1. Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P. Security patterns: integrating security and systems engineering. 1st ed. Chichester: Wiley; 2005.

    Google Scholar 

  2. Buschmann F, Meunier R, Rohnert H, Sommerlad P, Stal M. Pattern-oriented software architecture, vol. 1. 1st ed., A system of patterns. Chichester: Wiley; 1995.

    Google Scholar 

  3. Sowa JF. Knowledge design patterns—combining logic, ontology and computation. 2012. http://www.jfsowa.com/talks/kdptut.pdf. Accessed 8 Sept 2013.

  4. Milner R. Communicating and mobile systems: the Pi-calculus. 1st ed. Cambridge: Cambridge University Press; 1999.

    Google Scholar 

  5. ISO/IEC. International Standard ISO/IEC 17799:2005. Information technology—security techniques—code of practice for information security management. Geneva: ISO Copyright Office; 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul J. Kearney .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Kearney, P.J., Sinclair, D.A., Wagner, S. (2014). Security Design Patterns in the MASTER Workbench. In: Blackwell, C., Zhu, H. (eds) Cyberpatterns. Springer, Cham. https://doi.org/10.1007/978-3-319-04447-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04447-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04446-0

  • Online ISBN: 978-3-319-04447-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics