Security pattern lattice: A formal model to organize security patterns

被引:10
|
作者
Sarmah, Achyanta [1 ]
Hazarika, Shyamanta M. [1 ]
Sinha, Smriti K. [1 ]
机构
[1] Tezpur Univ, Sch Engn, Tezpur, Assam, India
关键词
trust; security pattern; Formal Concept Analysis; concept lattice; scaling;
D O I
10.1109/DEXA.2008.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Except for some work in classifying Security Patterns (SP) based on taxonomy and linguistic metaphors not much has been done in organizing SP. No suitable formal model for organization of security patterns is yet available. In this paper, exploiting results from Formal Concept Analysis (FCA) a formal model to organize SP is introduced. Using a trust-based security model, Trust Elements (TE) and SP are enumerated. These elements and patterns are treated as formal concepts leading to a Security Pattern Lattice SPL and organized as a concept lattice to generate the security pattern lattice. Within such a model the patterns are categorized using the FCA technique of scaling.
引用
收藏
页码:292 / 296
页数:5
相关论文
共 50 条
  • [31] Using Refinement in Formal Development of OS Security Model
    Devyanin, Petr N.
    Khoroshilov, Alexey V.
    Kuliamin, Victor V.
    Petrenko, Alexander K.
    Shchepetkov, Ilya V.
    PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2015, 2016, 9609 : 107 - 115
  • [32] Cryptography as a formal method and model for security in electronic payments
    Tsiakis, T
    Stephanides, G
    Pekos, G
    INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 235 - 242
  • [33] A formal model for network-wide security analysis
    Matousek, Petr
    Rab, Jaroslav
    Rysavy, Ondrej
    Sveda, Miroslav
    FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2008, : 171 - 181
  • [34] Provably secure multisignatures in formal security model and their optimality
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 107 - 118
  • [35] Formal Security Policy Model for a Common Criteria evaluation
    Park, Junkil
    Choi, Jin-Young
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 277 - +
  • [36] Integrating Formal Methods for Security in Software Security Education
    Modesti, Paolo
    INFORMATICS IN EDUCATION, 2020, 19 (03): : 425 - 454
  • [37] Security Patterns 2.0 Towards Security Patterns Based on Security Building Blocks
    van den Berghe, Alexander
    Yskout, Koen
    Joosen, Wouter
    2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 2018, : 45 - 48
  • [38] CAMPAIGN TO ORGANIZE FEDERAL TRANSPORTATION SECURITY OFFICERS: A MODEL OF OPEN SOURCE UNIONISM
    Pinnock, Sharon
    WORKING USA-THE JOURNAL OF LABOR AND SOCIETY, 2007, 10 (03): : 301 - 310
  • [39] Formal Methods for Socio-technical Security (Formal and Automated Analysis of Security Ceremonies)
    Vigano, Luca
    COORDINATION MODELS AND LANGUAGES, 2022, 13271 : 3 - 14
  • [40] Security Patterns
    Markus Schumacher
    Informatik-Spektrum, 2002, 25 (3) : 220 - 223