TY - GEN
T1 - A methodology for mining security tactics from security patterns
AU - Ryoo, Jungwoo
AU - Laplante, Phil
AU - Kazman, Rick
N1 - Copyright:
Copyright 2010 Elsevier B.V., All rights reserved.
PY - 2010
Y1 - 2010
N2 - Although many aids such as architectural styles and patterns are now available for software architects, making optimal design decisions on appropriate architectural structures still requires significant creativity. In an effort to introduce a more direct link between an architectural decision and its consequences, a finer grained architectural concept called a tactic has emerged. Since its introduction, many tactics have been identified and used in real- life applications. However, the number of tactics discovered is not sufficient to cover all the necessary aspects of architectural decision making. The tactics could be created from scratch, but it would be more efficient if tactics could be mined from a proven source. One possible source is any architectural pattern that consists of tactics. Therefore, in this paper we propose a novel way to retrieve tactics from well known patterns. Among the many different types of existing patterns, this paper focuses on security patterns.
AB - Although many aids such as architectural styles and patterns are now available for software architects, making optimal design decisions on appropriate architectural structures still requires significant creativity. In an effort to introduce a more direct link between an architectural decision and its consequences, a finer grained architectural concept called a tactic has emerged. Since its introduction, many tactics have been identified and used in real- life applications. However, the number of tactics discovered is not sufficient to cover all the necessary aspects of architectural decision making. The tactics could be created from scratch, but it would be more efficient if tactics could be mined from a proven source. One possible source is any architectural pattern that consists of tactics. Therefore, in this paper we propose a novel way to retrieve tactics from well known patterns. Among the many different types of existing patterns, this paper focuses on security patterns.
UR - http://www.scopus.com/inward/record.url?scp=77951710898&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77951710898&partnerID=8YFLogxK
U2 - 10.1109/HICSS.2010.18
DO - 10.1109/HICSS.2010.18
M3 - Conference contribution
AN - SCOPUS:77951710898
SN - 9780769538693
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
BT - Proceedings of the 43rd Annual Hawaii International Conference on System Sciences, HICSS-43
T2 - 43rd Annual Hawaii International Conference on System Sciences, HICSS-43
Y2 - 5 January 2010 through 8 January 2010
ER -