Security Engineering with Patterns

Origins, Theoretical Model, and New Applications

  • Markus┬áSchumacher

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2754)

Table of contents

  1. Front Matter
  2. Markus Schumacher
    Pages 1-9
  3. Markus Schumacher
    Pages 11-27
  4. Markus Schumacher
    Pages 29-44
  5. Markus Schumacher
    Pages 45-55
  6. Markus Schumacher
    Pages 57-86
  7. Markus Schumacher
    Pages 87-96
  8. Markus Schumacher
    Pages 97-119
  9. Markus Schumacher
    Pages 121-140
  10. Markus Schumacher
    Pages 141-159
  11. Markus Schumacher
    Pages 161-166
  12. Markus Schumacher
    Pages 167-169
  13. Markus Schumacher
    Pages 171-178
  14. Markus Schumacher
    Pages 179-184
  15. Markus Schumacher
    Pages 185-188
  16. Markus Schumacher
    Pages 189-194
  17. Back Matter

About this book

Introduction

For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement.

This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.

Keywords

Annotation Backbone Internet risk analysis secure programming security security best practices security building blocks security engineering security knowledge process security management security patterns software architecture software patterns systems security

Authors and affiliations

  • Markus┬áSchumacher
    • 1
  1. 1.Department of Computer Science (@ITO), IT Transfer OfficeDarmstadt University of TechnologyDarmstadtGermany

Bibliographic information

  • DOI https://doi.org/10.1007/b11930
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40731-7
  • Online ISBN 978-3-540-45180-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book