Abstract:
"The activity of the secure system development can be supported by reusing extensive knowledge accumulated about security in the form of security patterns. However, the attention is not paid enough to the approach as it lies in the boundary of various fields and lose the focus of mainstream research. The presentation will walk through the definition of security design patterns, where to find and how to apply it to your design with a case study of a real q-mail system architecture"
Material on which the talk is based:
- James Walden, “Secure design patterns”,
- Chris Steel, Ramesh Nagappan and Ray Lai, "Core Security Patterns".
- MunawarHafiz, Ralph Johnson and Raja Afandi, "Security architecture of qmail"
<https://netfiles.uiuc.edu/mhafiz/www/research/patterns/PLoP2004_mhafiz1_0.pdf>
- Nobukazu Yoshioka, Hironori Washizaki and Katsuhisa Maruyama, "A survey on security patterns".