Selecting Security Patterns that Fulfill Security Requirements
Conference paper
Weiss, Michael and Mouratidis, Haralambos 2008. Selecting Security Patterns that Fulfill Security Requirements. 16th IEEE International Conference on Requirements Engineering. Barcelona, Spain 08 - 12 Sep 2008
Authors | Weiss, Michael and Mouratidis, Haralambos |
---|---|
Type | Conference paper |
Abstract | Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements. |
Keywords | software engineering; Secure information systems |
Year | 2008 |
Conference | 16th IEEE International Conference on Requirements Engineering |
Accepted author manuscript | License CC BY-ND |
Publication dates | |
Sep 2008 | |
Publication process dates | |
Deposited | 07 Dec 2009 |
Web address (URL) | http://doi.ieeecomputersociety.org/10.1109/RE.2008.32 |
http://hdl.handle.net/10552/426 | |
Additional information | Citation: |
https://repository.uel.ac.uk/item/864yv
Download files
106
total views306
total downloads0
views this month0
downloads this month