ARTICLE | doi:10.20944/preprints201904.0106.v1
Subject: Engineering, Other Keywords: cloud computing; security patterns; privacy patterns; software and system architecture
Online: 9 April 2019 (11:46:02 CEST)
Requirements for cloud services include security and privacy. Although many security patterns, privacy patterns, and non-pattern-based knowledge have been reported, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the Cloud Security and Privacy Metamodel (CSPM). CSPM uses a consistent approach to classify and support existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.
ARTICLE | doi:10.20944/preprints202011.0418.v1
Subject: Mathematics & Computer Science, Algebra & Number Theory Keywords: Security patterns; Software patterns; Systematic literature review (SLR)
Online: 16 November 2020 (12:13:53 CET)
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.