Selecting security patterns that fulfill security requirements
Over the last few years a large number of security patterns have been proposed. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we present a selection approach for security patterns, which allows us to understand in depth the trade-offs involved in the patterns and the implications of a pattern to various security requirements. Moreover, our approach supports the search for a combination of security patterns that will meet given security requirements.
|Conference||16th IEEE International Requirements Engineering Conference, RE'08|
Weiss, M, & Mouratidis, H. (2008). Selecting security patterns that fulfill security requirements. Presented at the 16th IEEE International Requirements Engineering Conference, RE'08. doi:10.1109/RE.2008.32