Title :
Selecting Security Patterns that Fulfill Security Requirements
Author :
Weiss, M. ; Mouratidis, H.
Author_Institution :
Dept. of Syst. & Comput. Eng., Carleton Univ., Ottawa, ON
Abstract :
Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements.
Keywords :
formal specification; formal verification; security of data; systems analysis; security pattern selection; security requirement; Clouds; Computer industry; Computer security; Guidelines; Navigation; Pattern recognition; Search engines; Software systems; Systems engineering and theory; Visualization; Secure Tropos; Security Patterns; Security Requirements;
Conference_Titel :
International Requirements Engineering, 2008. RE '08. 16th IEEE
Conference_Location :
Catalunya
Print_ISBN :
978-0-7695-3309-4