skip to main content
10.1145/2384716.2384746acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
poster

The nature of order: from security patterns to a pattern language

Published:19 October 2012Publication History

ABSTRACT

We present a pattern language containing all security patterns that have been published in various venues. Ours is the first pattern language that covers an entire problem domain; to our best knowledge, it is also the largest in software.

References

  1. C. Alexander, S. Ishakawa, and M. Silverstein. A Pattern Language: Towns, Building and Construction. Oxford University Press, New York, 1977.Google ScholarGoogle Scholar
  2. B. Blakley and C. Heath. Security design patterns technical guide - Version 1. Technical report, Open Group(OG), 2004.Google ScholarGoogle Scholar
  3. M. Hafiz. A Pattern Language for Developing Privacy Enhancing Technologies. To be published in Software - Practice and Experience, 2012.Google ScholarGoogle Scholar
  4. M. Hafiz and R. Johnson. Evolution of the MTA architecture: The impact of security. Software - Practice and Experience, 38 (15): 1569--1599, Dec 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Hafiz, P. Adamczyk, and R. E. Johnson. Organizing security patterns. IEEE Software, 24 (4): 52--60, July/August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Hafiz, P. Adamczyk, and R. Johnson. Growing a pattern language (for security). In OOPSLA, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Hogg, D. Smith, F. Chong, D. Taylor, L. Wall, and P. Slater. Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0. Microsoft Press, March 2006.Google ScholarGoogle Scholar
  8. D. Kienzle, M. Elder, D. Tyree, and J. Edwards-Hewitt. Security patterns repository version 1.0, 2002.Google ScholarGoogle Scholar
  9. S. Romanosky. Security design patterns part 1, Nov 2001.Google ScholarGoogle Scholar
  10. S. Romanosky. Enterprise security patterns, 2002.Google ScholarGoogle Scholar
  11. M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. John Wiley and Sons, December 2005. ISBN 0-470-85884-2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Steel, R. Nagappan, and R. Lai. Core Security Patterns : Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management. Prentice Hall PTR, Oct 2005.Google ScholarGoogle Scholar
  13. F. Swiderski and W. Snyder. Threat Modeling. Microsoft Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Yoder and J. Barcalow. Architectural patterns for enabling application security. In Proceedings of the 4th Conference on Patterns Language of Programming (PLoP'97), 1997.Google ScholarGoogle Scholar

Index Terms

  1. The nature of order: from security patterns to a pattern language

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader