dc.coverage.spatial |
Ottawa, Canada |
en_US |
dc.creator |
Mourad, A. |
en_US |
dc.creator |
Laverdiere, M-a. |
en_US |
dc.creator |
Hanna, A. |
en_US |
dc.creator |
Debbabi, M. |
en_US |
dc.date.accessioned |
2017-03-08T09:55:58Z |
|
dc.date.available |
2017-03-08T09:55:58Z |
|
dc.identifier.isbn |
1-4244-0038-4 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/5329 |
|
dc.description.abstract |
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the appearance of this research topic in 1997, several catalogs have emerged, and the security pattern community has produced significant contributions, with many related to design. In this paper, we survey major contributions in the state of the art in the field of security design patterns and assess their quality in the context of an established classification. From our results, we determined a classification of inappropriate pattern qualities. Using a six sigma approach, we propose a set of desirable properties that would prevent flaws in new design patterns, as well as a template for expressing them |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.title |
Canadian Conference on Electrical and Computer Engineering, 2006 |
en_US |
dc.title |
Security design patterns |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.title.subtitle |
survey and evaluation |
en_US |
dc.creator.school |
SAS |
en_US |
dc.creator.identifier |
200904853 |
en_US |
dc.creator.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.keywords |
Computer security |
en_US |
dc.keywords |
Cryptography |
en_US |
dc.keywords |
Laboratories |
en_US |
dc.keywords |
Catalogs |
en_US |
dc.keywords |
Guidelines |
en_US |
dc.keywords |
Application software |
en_US |
dc.keywords |
Computer industry |
en_US |
dc.keywords |
Buildings |
en_US |
dc.keywords |
Information security |
en_US |
dc.keywords |
Software design |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.1109/CCECE.2006.277727 |
en_US |
dc.identifier.ctation |
Laverdiere, M. A., Mourad, A., Hanna, A., & Debbabi, M. (2006, May). Security design patterns: Survey and evaluation. In Electrical and Computer Engineering, 2006. CCECE'06. Canadian Conference on (pp. 1605-1608). IEEE. |
en_US |
dc.creator.email |
azzam.mourad@lau.edu.lb |
en_US |
dc.date.created |
7-10 May 2006 |
en_US |
dc.description.pages |
1605-1608 |
en_US |
dc.description.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://ieeexplore.ieee.org/abstract/document/4055006/ |
en_US |
dc.identifier.orcid |
https://orcid.org/0000-0001-9434-5322 |
|
dc.identifier.orcid |
https://orcid.org/0000-0001-9434-5322 |
en_US |
dc.date.datepublished |
2006 |
en_US |
dc.creator.ispartof |
Lebanese American University |
en_US |