Improving the usability of security patterns through a centralized repository

dc.contributor.advisorNiu, Jianwei
dc.contributor.authorLehker, Jean-Michel
dc.contributor.committeeMemberWang, Xiaoyin
dc.contributor.committeeMembervon Ronne, Jeffery
dc.descriptionThis item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID.
dc.description.abstractSecurity patterns represent reusable security practices that can be applied to a specific problem in order to generate a solution. The reuse of existing practices both decreases the time spent on solving a problem and improves the quality of the product by applying tried-and-tested solutions. In the wild, security patterns are documented in many forms from many sources. This increases the difficulty of locating the most appropriate pattern(s) for a situation. I address this issue by creating a security pattern repository to not only store and manage these patterns, but have the ability to link a particular pattern with a set of CWE (Common Weakness Enumeration) entries. Furthermore, I propose a design for a study to better understand how software engineers search for patterns and apply the resulting information to our search engine.
dc.description.departmentComputer Science
dc.format.extent36 pages
dc.subjectApplied sciences
dc.subject.classificationComputer science
dc.titleImproving the usability of security patterns through a centralized repository
dcterms.accessRightspq_closed Science of Texas at San Antonio of Science


Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
245.08 KB
Adobe Portable Document Format