.

Security design patterns

LAUR Repository

Show simple item record

dc.contributor.author Laverdiere, M-a.
dc.contributor.author Mourad, A.
dc.contributor.author Hanna, A.
dc.contributor.author Debbabi, M.
dc.date.accessioned 2017-03-08T09:55:58Z
dc.date.available 2017-03-08T09:55:58Z
dc.date.issued 2017-03-08
dc.identifier.isbn 1424400384 en_US
dc.identifier.uri http://hdl.handle.net/10725/5329
dc.description.abstract Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the appearance of this research topic in 1997, several catalogs have emerged, and the security pattern community has produced significant contributions, with many related to design. In this paper, we survey major contributions in the state of the art in the field of security design patterns and assess their quality in the context of an established classification. From our results, we determined a classification of inappropriate pattern qualities. Using a six sigma approach, we propose a set of desirable properties that would prevent flaws in new design patterns, as well as a template for expressing them en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.title Security design patterns en_US
dc.type Conference Paper / Proceeding en_US
dc.title.subtitle survey and evaluation en_US
dc.author.school SAS en_US
dc.author.idnumber 200904853 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.keywords Computer security en_US
dc.keywords Cryptography en_US
dc.keywords Laboratories en_US
dc.keywords Catalogs en_US
dc.keywords Guidelines en_US
dc.keywords Application software en_US
dc.keywords Computer industry en_US
dc.keywords Buildings en_US
dc.keywords Information security en_US
dc.keywords Software design en_US
dc.identifier.doi http://dx.doi.org/10.1109/CCECE.2006.277727 en_US
dc.identifier.ctation Laverdiere, M. A., Mourad, A., Hanna, A., & Debbabi, M. (2006, May). Security design patterns: Survey and evaluation. In 2006 Canadian Conference on Electrical and Computer Engineering (pp. 1605-1608). IEEE. en_US
dc.author.email azzam.mourad@lau.edu.lb en_US
dc.conference.date 7-10 May 2006 en_US
dc.conference.pages 1605-1608 en_US
dc.conference.place Ottawa, Ont., Canada en_US
dc.conference.title 2006 Canadian Conference on Electrical and Computer Engineering en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://ieeexplore.ieee.org/abstract/document/4055006/ en_US
dc.orcid.id https://orcid.org/0000-0001-9434-5322
dc.publication.date 2006 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account