An Exploratory Study of the Security Design Pattern Landscape and their Classification

2016 ◽  
Vol 7 (3) ◽  
pp. 26-43 ◽  
Author(s):  
Poonam Ponde ◽  
Shailaja Shirwaikar

Security is a critical part of information systems and must be integrated into every aspect of the system. It requires a lot of expertise to design and implement secure systems due to the broad coverage of security issues and threats. A good system design is based on sound software engineering principles which leverages proven best practices in the form of standard guidelines and design patterns. A design pattern represents a reusable solution to a recurring problem in a specific context. The current security design pattern landscape contains several patterns, pattern catalogs and pattern classification schemes. To apply appropriate patterns for a specific problem context, a deeper understanding of this domain is essential. A survey of patterns and their classification schemes will aid in understanding pattern coverage and identifying gaps. In this paper, the authors have presented a detailed exploratory study of the security design pattern landscape. Based on their study, the authors have identified shortcomings and presented future research directions.

2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Author(s):  
Sherri S. Frizell ◽  
Roland Hübscher

Design patterns have received considerable attention for their potential as a means of capturing and sharing design knowledge. This chapter provides a review of design pattern research and usage within education and other disciplines, summarizes the reported benefits of the approach, and examines design patterns in relation to other approaches to supporting design. Building upon this work, it argues that design patterns can capture learning design knowledge from theories and best practices to support novices in effective e-learning design. This chapter describes the authors’ work on the development of designs patterns for e-learning. It concludes with a discussion of future research for educational uses of design patterns.


1997 ◽  
Vol 21 (2) ◽  
pp. 37-54 ◽  
Author(s):  
Candida G. Brush ◽  
Radha Chaganti

Cooperative strategies are of growing interest in entrepreneurship. Current research focuses on high-tech companies, but less is known about cooperative activities in non-high-tech businesses. Differences in distinct competencies based on technology suggest that lessons from high-tech companies may not fully apply to non-high-tech companies. This research explores the nature, extent, and approaches to cooperative strategies in non-high-tech new ventures, utilizing quantitative and qualitative methods. Survey data is analyzed to assess usage and characteristics of cooperative strategies. Results show that few companies used cooperative strategies and these were not central to core operations. Field interviews comparing three non-high-tech and three high-tech new ventures examine motives and approaches to cooperative strategies. For all six cases, resource constraints motivated usage of cooperative strategies and all had cooperative arrangements with competitors. However, goals and approaches to cooperative strategies differed between non-high-tech and high-tech businesses. Findings suggest future research directions.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


Author(s):  
Petros Georgiakakis ◽  
Simos Retalis ◽  
Marlies Bitter-Rijpkema ◽  
Kees Pannekeet ◽  
Marjo Rutjens ◽  
...  

This chapter proposes a design pattern based on the Six Thinking Hats Creativity technique to foster the collaboration among specialists of various fields. It exemplifies the value of pattern languages for the work in multidisciplinary teams and discusses how the proposed pattern helped in a design project in which a groupware system is developed. Following the structure of flow design patterns, the Six Thinking Hats Technique is described in the pattern format taking the problem context and its forces into account. In its solution part, the pattern describes the types of tasks as well as the types and structure of groups for each of the various roles defined by this creativity technique. The core solution of the present pattern is to shift between various perspectives and to incorporate multiple views of the stakeholders.


2017 ◽  
Vol 2 (1) ◽  
pp. A49-A70
Author(s):  
Carol C. Bishop ◽  
Dana R. Hermanson ◽  
Richard A Riley

ABSTRACT Many parties have pointed to the difficulty of preventing collusive fraud, as well as the large losses caused by collusion. However, relatively little is known about how collusive fraud differs from solo-offender fraud. To begin to fill this gap in the literature, this exploratory study examines differences between collusive fraud and solo-offender fraud, focusing on characteristics of the leader (perpetrator), incident, and organization. We use survey data collected by the Association of Certified Fraud Examiners (ACFE) on worldwide fraud cases from 2002 to 2013. The results highlight a number of unique dimensions of collusive fraud, including that collusive fraud leaders are more likely to be younger males with close ties to customers or vendors and a wheeler-dealer attitude. We discuss future research directions and implications for practice.


Author(s):  
Bruno Cardoso ◽  
Eduardo Figueiredo

A design pattern is a general reusable solution to a recurring problem in software design. Bad smells are symptoms that may indicate something wrong in the system design or code. Therefore, design patterns and bad smells represent antagonistic structures. They are subject of recurring research and typically appear in software systems. Although design patterns represent good design, their use is often inadequate because their implementation is not always trivial or they may be unnecessarily employed. The inadequate use of design patterns may lead to a bad smell. Therefore, this paper performs an exploratory study in order to identify instances of co-occurrences of design patterns and bad smells. This study is performed over five systems and discovers some co-occurrences between design patterns and bad smells. For instance, we observed the co-occurrences of Command with God Class and Template Method with Duplicated Code. The results of this study make it possible to understand in which situations design patterns are misused or overused and establish guidelines for their better use.


2020 ◽  
Vol 1 (2) ◽  
pp. 92-102
Author(s):  
Arun Kumar Sharma ◽  
Birendra KC ◽  
Araceli Hernandez Calderon

The safety and security of a destination is an essential factor that helps travelers decide whether to visit or not. In Nepal, Thamel is the main destination for tourists due to the availability of multiple facilities and services. In fact, most of the tourists who use airspace to travel to Nepal, start and conclude their journey in Thamel. Therefore, the safety and security of Thamel is an important factor that influences the fate of the Nepalese tourism industry. However, there is a lack of research to understand the safety and security situation of Thamel. The purpose of this exploratory study is to assess the overall security situation and challenges in Thamel. Descriptive statistics are used to present the findings. Findings suggest that Thamel as a tourism destination has many areas for improvement to provide better tourist experiences. Since Thamel is a starting and concluding point of attraction for tourists, we offer important managerial implications and future research directions.


2020 ◽  
Vol 01 (04) ◽  
pp. 170-182
Author(s):  
A K M Bahalul Haque ◽  
Sonia Tasmin

Internet of things (IoT) is the epitome of sustainable development. It has facilitated the development of smart systems, industrialization, and the state-of-the-art quality of life. IoT architecture is one of the essential baselines of understanding the widespread adoption. Security issues are very crucial for any technical infrastructure. Since IoT comprises heterogeneous devices, its security issues are diverse too. Various security attacks can be responsible for compromising confidentiality, integrity, and availability. In this paper, at first, the IoT architecture is described briefly. After that, the components of IoT are explained with perspective to various IoT based applications and services. Finally, various security issues, including recommended solutions, are elaborately described and the potential research challenges and future research directions.


Sign in / Sign up

Export Citation Format

Share Document