Analysis of Application of Security Patterns to Build Secure Systems

被引:0
|
作者
Ortiz, Roberto [1 ]
Garzas, Javier [2 ]
Fernandez-Medina, Eduardo [3 ]
机构
[1] Grp S21Sec Gest SA, S21SecLabs SOC, Valgrande 10, Madrid 28108, Spain
[2] Univ Rey Juan Carlos, Dept Comp Languages & Syst 2, Kybele Grp, Madrid 28933, Spain
[3] Univ Castilla La Mancha, Dept Informat Technol & Syst, GSyA Res Grp, Ciudad Real, Spain
关键词
Security patterns; secure systems; information security; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Both new technology business models and the new tendencies in the field of computing are forcing organizations to undergo a constant evolution in order to maintain their competitiveness in markets. This evolution has led to a continuous remodeling of companies 'systems to enable them to adapt to the new needs. These changes increase these systems' complexity, making them more vulnerable. Computer attacks against organizations are therefore increasing considerably. If this is to be avoided, information security engineers need reliable and validated solutions with which to confront security problems, along with agile solutions to confront the new technological necessities in an optimal manner. Security patterns are good mechanisms with which to perform this task since they provide documented, validated and tested solutions to recurring problems. In this paper we carry out an analysis of those proposals that use security patterns to build secure systems when this task is performed in the information systems of a real organization, with the objective of detecting any shortcomings and new needs.
引用
收藏
页码:652 / +
页数:3
相关论文
共 50 条
  • [41] Application of ImageJ program for the Analysis of Pupil Reaction in Security Systems
    Oksana, Isaeva
    Marina, Boronenko
    [J]. 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, AERONAUTICAL AND AUTOMOTIVE ENGINEERING (ICMAA 2020), 2020, 1519
  • [42] Oriented engineering application for voltage security analysis of power systems
    Zhou Xia
    Li Bi-jun
    Li Wen-yun
    Wu Chen
    Xu Tai-shan
    Ren Xian-cheng
    [J]. 2006 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, 2006, : 266 - +
  • [43] Security services architecture for Secure Mobile Grid Systems
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Lopez, Javier
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (03) : 240 - 258
  • [44] The Research and Application of Security Requirements Analysis Methodology of Information Systems
    Cui, Jing-Song
    Zhang, Da
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 30 - 36
  • [45] SYSTEMS OF SECURE PAYMENT. SECURITY IN ELECTRONIC COMMERCE
    Martinez Lopez, Luis
    Mata Mata, Francisco
    Rodriguez Dominguez, Rosa Ma
    [J]. REVISTA DE ESTUDIOS EMPRESARIALES-SEGUNDA EPOCA, 2009, (01): : 63 - 76
  • [46] Design of secure operating systems with high security levels
    Qing Sihan
    Shen ChangXiang
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 399 - 418
  • [47] Sensitivity theory in power systems: Application in dynamic security analysis
    Laufenberg, MJ
    Pai, MA
    [J]. PROCEEDINGS OF THE 1996 IEEE INTERNATIONAL CONFERENCE ON CONTROL APPLICATIONS, 1996, : 738 - 743
  • [48] Oriented engineering application for voltage security analysis of power systems
    Zhou, Xia
    Li, Bi-Jun
    Li, Wen-Yun
    Wu, Chen
    Xu, Tai-Shan, I
    Ren, Xian-Chengi
    [J]. ICIEA 2006: 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, PROCEEDINGS, 2006, : 645 - 648
  • [49] Design of secure operating systems with high security levels
    QING SiHan1
    2 School of Software and Microelectronics
    3 Institute of Computing Technology
    [J]. Science China(Information Sciences), 2007, (03) : 399 - 418
  • [50] Security knowledge representation artifacts for creating secure IT systems
    Fran Ruiz, Jose
    Arjona, Marcos
    Mana, Antonio
    Rudolph, Carsten
    [J]. COMPUTERS & SECURITY, 2017, 64 : 69 - 91