Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...