Usability support security patterns
- Autores
- Romaniz, Susana Cristina; Castellaro, Marta; Ramos, Juan C.; Ramos, Ignacio
- Año de publicación
- 2013
- Idioma
- español castellano
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- The main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams.
WSI - II Workshop de seguridad informática
Red de Universidades con Carreras en Informática (RedUNCI) - Materia
-
Ciencias Informáticas
security patterns
security intelligence
security patterns catalogue - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/32443
Ver los metadatos del registro completo
id |
SEDICI_5e0161153902fa03d168b02a4905b589 |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/32443 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Usability support security patternsRomaniz, Susana CristinaCastellaro, MartaRamos, Juan C.Ramos, IgnacioCiencias Informáticassecurity patternssecurity intelligencesecurity patterns catalogueThe main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams.WSI - II Workshop de seguridad informáticaRed de Universidades con Carreras en Informática (RedUNCI)2013-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdfhttp://sedici.unlp.edu.ar/handle/10915/32443spainfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-10-15T10:50:53Zoai:sedici.unlp.edu.ar:10915/32443Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-10-15 10:50:53.361SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Usability support security patterns |
title |
Usability support security patterns |
spellingShingle |
Usability support security patterns Romaniz, Susana Cristina Ciencias Informáticas security patterns security intelligence security patterns catalogue |
title_short |
Usability support security patterns |
title_full |
Usability support security patterns |
title_fullStr |
Usability support security patterns |
title_full_unstemmed |
Usability support security patterns |
title_sort |
Usability support security patterns |
dc.creator.none.fl_str_mv |
Romaniz, Susana Cristina Castellaro, Marta Ramos, Juan C. Ramos, Ignacio |
author |
Romaniz, Susana Cristina |
author_facet |
Romaniz, Susana Cristina Castellaro, Marta Ramos, Juan C. Ramos, Ignacio |
author_role |
author |
author2 |
Castellaro, Marta Ramos, Juan C. Ramos, Ignacio |
author2_role |
author author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas security patterns security intelligence security patterns catalogue |
topic |
Ciencias Informáticas security patterns security intelligence security patterns catalogue |
dc.description.none.fl_txt_mv |
The main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams. WSI - II Workshop de seguridad informática Red de Universidades con Carreras en Informática (RedUNCI) |
description |
The main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams. |
publishDate |
2013 |
dc.date.none.fl_str_mv |
2013-10 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/32443 |
url |
http://sedici.unlp.edu.ar/handle/10915/32443 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/ Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1846063942838779904 |
score |
13.22299 |