scholarly journals The Impact of the Computational Independent Model for Enterprise Information System Development

2010 ◽  
Vol 11 (8) ◽  
pp. 21-26 ◽  
Author(s):  
Yashwant Singh ◽  
Dr. Manu Sood
2008 ◽  
pp. 1476-1487
Author(s):  
M. Weiss

While many theoretical approaches to security engineering exist, they are often limited to systems of a certain complexity, and require security expertise that is not widely available. Additionally, in the practice of information system development security is but one of many concerns that needs to be addressed, and security concerns are often dealt with in an ad hoc manner. Security patterns promise to ?ll this gap. Patterns enable an ef?cient transfer of experience and skills. However, representing and selecting security patterns remains largely an empirical task. This becomes the more of a challenge as the number of security patterns documented in the literature grows, and as the patterns proposed by different authors often overlap in scope. Our contribution is to use a more explicit representation of the forces addressed by a pattern in the description of security patterns, which is based on non-functional requirements analysis. This representation helps us decide which patterns to ap-ply in a given design context, and anticipate the effect of using several patterns in combination. Speci?cally this chapter describes an approach for selecting security patterns, and exploring the impact of applying these patterns individually, and in concert with other patterns.


Author(s):  
M. Weiss

While many theoretical approaches to security engineering exist, they are often limited to systems of a certain complexity, and require security expertise that is not widely available. Additionally, in the practice of information system development security is but one of many concerns that needs to be addressed, and security concerns are often dealt with in an ad hoc manner. Security patterns promise to ?ll this gap. Patterns enable an ef?cient transfer of experience and skills. However, representing and selecting security patterns remains largely an empirical task. This becomes the more of a challenge as the number of security patterns documented in the literature grows, and as the patterns proposed by different authors often overlap in scope. Our contribution is to use a more explicit representation of the forces addressed by a pattern in the description of security patterns, which is based on non-functional requirements analysis. This representation helps us decide which patterns to ap-ply in a given design context, and anticipate the effect of using several patterns in combination. Speci?cally this chapter describes an approach for selecting security patterns, and exploring the impact of applying these patterns individually, and in concert with other patterns.


Sign in / Sign up

Export Citation Format

Share Document