Skip to Main content Skip to Navigation
Conference papers

Guiding the selection of security patterns based on security requirements and pattern classification

Abstract : Security pattern-based system and software engineering (PBSE) approaches aim at building secure software and systems by capturing and reusing artifacts that encapsulate security expert's knowledge called security patterns. In this context, security patterns are selected by developers based on security requirements. On the other hand, security risk management is an iterative approach that consists of: (1) a risk assessment activity for identifying, analyzing and evaluating security risks and (2) a risk treatment activity to mitigate these risks which result in issuing security requirements. Hence, risk management and security PBSE can be used together. In this context, this paper aims at guiding the selection of security patterns in security PBSE based on security risk management results and pattern classification. For illustration purposes, we consider an example of a SCADA (Supervisory Control And Data Acquisition) system.
Complete list of metadata

Cited literature [28 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01567086
Contributor : Open Archive Toulouse Archive Ouverte (OATAO) Connect in order to contact the contributor
Submitted on : Friday, July 21, 2017 - 4:14:17 PM
Last modification on : Monday, July 4, 2022 - 8:59:52 AM

File

motii_16869.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01567086, version 1
  • OATAO : 16869

Citation

Anas Motii, Brahim Hamid, Agnes Lanusse, Jean-Michel Bruel. Guiding the selection of security patterns based on security requirements and pattern classification. 20th European Conference on Pattern Language of Programs (EuroPlop 2015), Jul 2015, Kloster Irsee, Germany. pp. 1-17. ⟨hal-01567086⟩

Share

Metrics

Record views

455

Files downloads

405