A security engineering process based on patterns

被引:19
|
作者
Hatebur, Denis [1 ,2 ]
Heisel, Maritta [2 ]
Schmidt, Holger [2 ]
机构
[1] Inst Tech Syst GmbH, Dortmund, Germany
[2] Univ Duisburg Essen, Workgrp Software Engn, Dept Comp & Cognitive Sci, Duisburg, Germany
关键词
D O I
10.1109/DEXA.2007.36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security problems and associated solution approaches. They are arranged in a pattern system that makes dependencies between them explicit. We describe step-by-step how the pattern system can be used to analyze a given security problem and how solution approaches can be found. Further we introduce a new frame that focuses on the privacy requirement anonymity.
引用
收藏
页码:734 / +
页数:2
相关论文
共 50 条
  • [1] An engineering process for security patterns application in component based models
    Bouaziz, Rahma
    Kallel, Slim
    Coulette, Bernard
    [J]. 2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 231 - 236
  • [2] A Security Engineering Process for Systems of Systems using Security Patterns
    Ruiz, Jose Fran
    Rudolph, Carsten
    Mana, Antonio
    Arjona, Marcos
    [J]. 2014 8TH ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2014, : 8 - 11
  • [3] Ontology Based Patterns for Software Security Engineering
    Moradian, Esmiralda
    Hakansson, Anne
    Andersson, Jan-Olof
    [J]. ADVANCES IN KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, 2012, 243 : 406 - 419
  • [4] A process engineering method based on ontology and patterns
    Hug, Charlotte
    Front, Agnes
    Rieu, Dominique
    [J]. ICSOFT 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL ISDM/ABF, 2008, : 29 - 36
  • [5] System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework
    Czerny, Barbara J.
    [J]. SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (01): : 349 - 359
  • [6] Towards a security engineering process
    Artelsmair, C
    Wagner, R
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2003, : 22 - 27
  • [7] Security in business process engineering
    Backes, M
    Pfitzmann, B
    Waidner, M
    [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2003, 2678 : 168 - 183
  • [8] A CC-based security engineering process evaluation model
    Lee, J
    Lee, J
    Lee, S
    Choi, B
    [J]. 27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 130 - 135
  • [9] Secure Information Systems development -: Based on a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
  • [10] Method Engineering Process Patterns
    Asadi, Mohsen
    Ramsin, Raman
    [J]. ISEC 2009 - PROCEEDINGS OF THE 2ND INDIA SOFTWARE ENGINEERING CONFERENCE, 2009, : 143 - 144