Buch, Englisch, Band 2754, 210 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 347 g
Origins, Theoretical Models, and New Applications
Buch, Englisch, Band 2754, 210 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 347 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-40731-7
Verlag: Springer Berlin Heidelberg
For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement.
This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering Objektorientierte Softwareentwicklung
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
Weitere Infos & Material
1. Introduction.- 2. Patterns in Software Development.- 3. Ontologies.- 4. The Human Factor.- 5. Classifying Security Improvement Artifacts.- 6. Toward a Security Core Ontology.- 7. Foundations of Security Patterns.- 8. A Theoretical Model for Security Patterns.- 9. New Applications of Security Patterns.- 10. Summary and Outlook.- A. Sources for Mining Security Patterns.- B. Example Security Patterns and Annotations.- C. Ontology Development.- D. F-Logic Primer.- E. Gaining Security Expertise.