ABSTRACT
We present a pattern language containing all security patterns that have been published in various venues. Ours is the first pattern language that covers an entire problem domain; to our best knowledge, it is also the largest in software.
- C. Alexander, S. Ishakawa, and M. Silverstein. A Pattern Language: Towns, Building and Construction. Oxford University Press, New York, 1977.Google Scholar
- B. Blakley and C. Heath. Security design patterns technical guide - Version 1. Technical report, Open Group(OG), 2004.Google Scholar
- M. Hafiz. A Pattern Language for Developing Privacy Enhancing Technologies. To be published in Software - Practice and Experience, 2012.Google Scholar
- M. Hafiz and R. Johnson. Evolution of the MTA architecture: The impact of security. Software - Practice and Experience, 38 (15): 1569--1599, Dec 2008. Google ScholarDigital Library
- M. Hafiz, P. Adamczyk, and R. E. Johnson. Organizing security patterns. IEEE Software, 24 (4): 52--60, July/August 2007. Google ScholarDigital Library
- M. Hafiz, P. Adamczyk, and R. Johnson. Growing a pattern language (for security). In OOPSLA, 2012. Google ScholarDigital Library
- J. Hogg, D. Smith, F. Chong, D. Taylor, L. Wall, and P. Slater. Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0. Microsoft Press, March 2006.Google Scholar
- D. Kienzle, M. Elder, D. Tyree, and J. Edwards-Hewitt. Security patterns repository version 1.0, 2002.Google Scholar
- S. Romanosky. Security design patterns part 1, Nov 2001.Google Scholar
- S. Romanosky. Enterprise security patterns, 2002.Google Scholar
- M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. John Wiley and Sons, December 2005. ISBN 0-470-85884-2. Google ScholarDigital Library
- C. Steel, R. Nagappan, and R. Lai. Core Security Patterns : Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management. Prentice Hall PTR, Oct 2005.Google Scholar
- F. Swiderski and W. Snyder. Threat Modeling. Microsoft Press, 2004. Google ScholarDigital Library
- J. Yoder and J. Barcalow. Architectural patterns for enabling application security. In Proceedings of the 4th Conference on Patterns Language of Programming (PLoP'97), 1997.Google Scholar
Index Terms
The nature of order: from security patterns to a pattern language
Recommendations
A pattern language for creating pattern languages: 364 patterns for pattern mining, writing, and symbolizing
PLoP '16: Proceedings of the 23rd Conference on Pattern Languages of ProgramsIn this paper, we present the purpose, creating process, and overview of a pattern language for creating pattern languages, consisting 364 patterns for pattern mining, pattern writing, and pattern symbolizing. For the past 10 years, we, Iba Lab, have ...
Pattern naming patterns: symbolizing the content and value by expressions to facilitate intuitive comprehension
PLoP '16: Proceedings of the 23rd Conference on Pattern Languages of ProgramsIn this paper, we present Pattern Naming Patterns, which is a pattern language to create a pattern name that expresses the pattern symbolically, so that the readers will become eager to put into practice. This pattern language was created as part of ...
Pattern illustrating patterns: a pattern language for pattern illustrating
PLoP '15: Proceedings of the 22nd Conference on Pattern Languages of ProgramsThis paper is a challenge to clear the importance and specific theory of drawing illustration for pattern language, and recommend pattern writers to draw them. In this paper we introduce pattern illustration, as visual expressions on pattern language ...
Comments