Security Design Patterns

Written on October 31, 2004

The Open Group hat ein rund 100seitiges PDF-Dokument mit Security Design Patterns veröffentlicht.

Aus dem Inhalt:

  1. Introduction

  2. The Nature of Patterns
    2.1 Minimal Definition for a Pattern
    2.2 How to Recognize a Pattern
    2.3 Defining a Good Pattern

  3. The Open Group Pattern Template

  4. The System of Security Patterns
    4.1 Available System Patterns
    4.2 Protected System Patterns

  5. Design Methodology
    5.1 System Security Sequence
    5.2 Available System Sequence
    5.3 Protected System Sequence
    5.4 Review

  6. Example: Secure Mail

  7. Available System Patterns
    7.1 Checkpointed System
    7.2 Standby
    7.3 Comparator-Checked Fault-Tolerant System
    7.4 Replicated System
    7.5 Error Detection/Correction

  8. Protected System Patterns
    8.1 Protected System
    8.2 Policy
    8.3 Authenticator
    8.4 Subject Descriptor
    8.5 Secure Communication
    8.6 Security Context
    8.7 Security Association
    8.8 Secure Proxy

Vor dem Download ist allerdings ein kleines Formular auszufĂĽllen (aber wozu gibts GMail ;-))