Abstract

Security management and business assets protection have been a paramount concern for many years. Due to the flood of arising innovative technologies such as cloud computing or big data, security approaches have constantly evolved toward more sophisticate solutions, aiming to tackle always more complex security issues. Nowadays, integrated frameworks are necessary to manage this complexity. Pattern-based approaches for reusing security solutions have proven its usefulness, but mostly in the frame of security matters. Acknowledging this, the scientific community has recently considered how these patterns could also be used to address the complexity caused by the association of multiple security criteria. Approaches based on the combination of simple security patterns have emerged and have resulted in the elaboration of methods for designing systems of security patterns and systems managing these collections of patterns. Nonetheless, in that domain, we have observed that researches are mostly focused on the definition of security solutions and do not address the complexity of the security requirements yet. In this paper we present a proposal for addressing this issue by means of a framework for engineering reusable security patterns for complex systems called COPERATE (COmPlex sEcurity Requirements pAtTErns). To show the feasibility of our approach, this framework is used for defining a complex security requirement and its corresponding pattern for an excerpt of a case taken from the cloud-computing domain.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.