Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/73455
Citations
Scopus Web of Science® Altmetric
?
?
Type: Journal article
Title: Securing distributed systems using patterns: A survey
Author: Uzunov, A.
Fernandez, E.
Falkner, K.
Citation: Computers and Security, 2012; 31(5):681-703
Publisher: Elsevier Advanced Technology
Issue Date: 2012
ISSN: 0167-4048
1872-6208
Statement of
Responsibility: 
Anton V. Uzunov, Eduardo B. Fernandez, Katrina Falkner
Abstract: Driven by expanding scientific computing and business enterprise needs, the last decade has seen a shift toward software paradigms in which distribution plays a central role. The increasing size, complexity and heterogeneity of the corresponding systems is accompanied by an increase of security vulnerabilities that require mitigation via combined security and software engineering strategies. In this respect security patterns, which build on the success of design patterns and software patterns more generally, are a tool of great value. In this paper we comprehensively survey the state-of-the-art in securing distributed systems using (security) patterns, considering both relevant patterns and methodologies for applying them. In the first part of the survey, we provide detailed reviews of our selected security patterns, classify the patterns using a multi-dimensional scheme and evaluate them according to a set of quality categories. This highlights deficiencies in the reviewed patterns and provides a basis for identifying new or "missing" patterns and pattern classes. The newly identified and surveyed patterns are a step forward in defining a pattern language for distributed computing. In the second part of the survey, we briefly review a number of pattern-based security methodologies and evaluate their maturity and appropriateness for securing distributed systems. © 2012 Elsevier Ltd. All rights reserved.
Keywords: Computer security
Patterns
Distributed systems
Software engineering
Methodologies
Rights: Copyright © 2012 Elsevier Ltd. All rights reserved.
DOI: 10.1016/j.cose.2012.04.005
Published version: http://dx.doi.org/10.1016/j.cose.2012.04.005
Appears in Collections:Aurora harvest 5
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.