Visible to the public Biblio

Filters: Keyword is Security Pattern  [Clear All Filters]
2023-07-13
Armoush, Ashraf.  2022.  Towards the Integration of Security and Safety Patterns in the Design of Safety-Critical Embedded Systems. 2022 4th International Conference on Applied Automation and Industrial Diagnostics (ICAAID). 1:1–6.
The design of safety-critical embedded systems is a complex process that involves the reuse of proven solutions to fulfill a set of requirements. While safety is considered as the major requirement to be satisfied in safety-critical embedded systems, the security attacks can affect the security as well as the safety of these systems. Therefore, ensuring the security of the safety-critical embedded systems is as important as ensuring the safety requirements. The concept of design patterns, which provides common solutions to widely recurring design problems, have been extensively engaged in the design of the hardware and software in many fields, including embedded systems. However, there is an inadequacy of experience with security patterns in the field of safety-critical embedded systems. To address this problem, this paper proposes an approach to integrate security patterns with safety patterns in the design of safety-critical embedded systems. Moreover, it presents a customized representation for security patterns to be more relevant to the common safety patterns in the context of safety-critical embedded systems.
2019-03-22
Moreno, Julio, Fernandez, Eduardo B., Fernandez-Medina, Eduardo, Serrano, Manuel A..  2018.  A Security Pattern for Key-Value NoSQL Database Authorization. Proceedings of the 23rd European Conference on Pattern Languages of Programs. :12:1-12:4.

Numerous authorization models have been proposed for relational databases. On the other hand, several NoSQL databases used in Big Data applications use a new model appropriate to their requirements for structure, speed, and large amount of data. This model protects each individual cell in key-value databases by labeling them with authorization rights following a Role-Based Access Control model or similar. We present here a pattern to describe this model as it exists in several Big Data systems.