Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Systematic Literature Review of Security Pattern Research

Version 1 : Received: 14 November 2020 / Approved: 16 November 2020 / Online: 16 November 2020 (12:13:53 CET)

How to cite: Washizaki, H.; Xia, T.; Kamata, N.; Fukazawa, Y.; Kanuka, H.; Kato, T.; Yoshino, M.; Okubo, T.; Ogata, S.; Kaiya, H.; Hazeyama, A.; Tanaka, T.; Yoshioka, N.; Priyalakshmi, G. Systematic Literature Review of Security Pattern Research. Preprints 2020, 2020110418 (doi: 10.20944/preprints202011.0418.v1). Washizaki, H.; Xia, T.; Kamata, N.; Fukazawa, Y.; Kanuka, H.; Kato, T.; Yoshino, M.; Okubo, T.; Ogata, S.; Kaiya, H.; Hazeyama, A.; Tanaka, T.; Yoshioka, N.; Priyalakshmi, G. Systematic Literature Review of Security Pattern Research. Preprints 2020, 2020110418 (doi: 10.20944/preprints202011.0418.v1).

Abstract

Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.

Subject Areas

Security patterns; Software patterns; Systematic literature review (SLR)

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.