Abstract
It is possible to reasonably measure the security quality of individual security patterns. However, more interesting is to ask: Can we show that a system built using security patterns is secure in some sense? We discuss here some issues about evaluating the security of a system built using security patterns. We consider the use of threats and misuse patterns to perform this evaluation.
| Original language | American English |
|---|---|
| DOIs | |
| State | Published - Feb 1 2010 |
| Event | ARES '10 International Conference on Availability, Reliability, and Security - Duration: Feb 1 2010 → … |
Conference
| Conference | ARES '10 International Conference on Availability, Reliability, and Security |
|---|---|
| Period | 2/1/10 → … |
Keywords
- security
- patterns
- security patterns
- pattern methodology
Disciplines
- Computer Sciences
Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS