Security Engineering with Patterns Origins, Theoretical Models, and New Applications /
For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requiremen...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Edition: | 1st ed. 2003. |
Series: | Lecture Notes in Computer Science,
2754 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- 1. Introduction
- 2. Patterns in Software Development
- 3. Ontologies
- 4. The Human Factor
- 5. Classifying Security Improvement Artifacts
- 6. Toward a Security Core Ontology
- 7. Foundations of Security Patterns
- 8. A Theoretical Model for Security Patterns
- 9. New Applications of Security Patterns
- 10. Summary and Outlook
- A. Sources for Mining Security Patterns
- B. Example Security Patterns and Annotations
- C. Ontology Development
- D. F-Logic Primer
- E. Gaining Security Expertise.