Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements.

doi.org/10.1109/RE.2008.32
16th IEEE International Requirements Engineering Conference, RE'08
Department of Systems and Computer Engineering

Weiss, M, & Mouratidis, H. (2008). Selecting security patterns that fulfill security requirements. Presented at the 16th IEEE International Requirements Engineering Conference, RE'08. doi:10.1109/RE.2008.32