Secure SDLC Using Security Patterns 2.0

Author(s):  
E. R. Aruna ◽  
A. Rama Mohan Reddy ◽  
K. V. N. Sunitha
Keyword(s):  
2022 ◽  
Vol 138 ◽  
pp. 102619
Author(s):  
Feifei Fan ◽  
Xiaojin Wen ◽  
Zhiming Feng ◽  
Yang Gao ◽  
Wenjun Li

2017 ◽  
Vol 143 (4) ◽  
pp. 05017011 ◽  
Author(s):  
Guangsheng Liu ◽  
Yuzhe Liang ◽  
Yingxuan Cheng ◽  
Hongmei Wang ◽  
Lu Yi

2007 ◽  
pp. 108-123 ◽  
Author(s):  
Francisco Sánchez-Cid ◽  
Antonio Muñoz ◽  
Daniel Serrano ◽  
M. C. Gago

2020 ◽  
pp. 485-494
Author(s):  
Charu Gupta ◽  
R. K. Singh ◽  
A. K. Mohapatra

Author(s):  
Hironori Washizaki ◽  
Tian Xia ◽  
Natsumi Kamata ◽  
Yoshiaki Fukazawa ◽  
Hideyuki Kanuka ◽  
...  

Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.


Sign in / Sign up

Export Citation Format

Share Document