Usability support security patterns

Autores
Romaniz, Susana Cristina; Castellaro, Marta; Ramos, Juan C.; Ramos, Ignacio
Año de publicación
2013
Idioma
español castellano
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
The main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams.
WSI - II Workshop de seguridad informática
Red de Universidades con Carreras en Informática (RedUNCI)
Materia
Ciencias Informáticas
security patterns
security intelligence
security patterns catalogue
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/32443

id SEDICI_5e0161153902fa03d168b02a4905b589
oai_identifier_str oai:sedici.unlp.edu.ar:10915/32443
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Usability support security patternsRomaniz, Susana CristinaCastellaro, MartaRamos, Juan C.Ramos, IgnacioCiencias Informáticassecurity patternssecurity intelligencesecurity patterns catalogueThe main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams.WSI - II Workshop de seguridad informáticaRed de Universidades con Carreras en Informática (RedUNCI)2013-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdfhttp://sedici.unlp.edu.ar/handle/10915/32443spainfo:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/2.5/ar/Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-10-15T10:50:53Zoai:sedici.unlp.edu.ar:10915/32443Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-10-15 10:50:53.361SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Usability support security patterns
title Usability support security patterns
spellingShingle Usability support security patterns
Romaniz, Susana Cristina
Ciencias Informáticas
security patterns
security intelligence
security patterns catalogue
title_short Usability support security patterns
title_full Usability support security patterns
title_fullStr Usability support security patterns
title_full_unstemmed Usability support security patterns
title_sort Usability support security patterns
dc.creator.none.fl_str_mv Romaniz, Susana Cristina
Castellaro, Marta
Ramos, Juan C.
Ramos, Ignacio
author Romaniz, Susana Cristina
author_facet Romaniz, Susana Cristina
Castellaro, Marta
Ramos, Juan C.
Ramos, Ignacio
author_role author
author2 Castellaro, Marta
Ramos, Juan C.
Ramos, Ignacio
author2_role author
author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
security patterns
security intelligence
security patterns catalogue
topic Ciencias Informáticas
security patterns
security intelligence
security patterns catalogue
dc.description.none.fl_txt_mv The main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams.
WSI - II Workshop de seguridad informática
Red de Universidades con Carreras en Informática (RedUNCI)
description The main feature of secure software lies in the nature of processes and practices used to specify, design, develop and implement software. Security patterns applied the concept of pattern in the security realm. Its description helps to capture immediately the essence: what is the problem to which attends and what the proposed solution is. The different formats that exist for its description and the multiplicity of sources make its discovery demand effort that discourages the systematic use by potential recipients. This paper presents the prototype of a catalogue that seeks to establish a bridge between the knowledge and experience security experts and the needs of knowledge of software development teams.
publishDate 2013
dc.date.none.fl_str_mv 2013-10
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/32443
url http://sedici.unlp.edu.ar/handle/10915/32443
dc.language.none.fl_str_mv spa
language spa
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1846063942838779904
score 13.22299