1. Trang chủ
  2. » Giáo Dục - Đào Tạo

security patterns integrating security and systems engineering

604 249 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Security Patterns Integrating Security and Systems Engineering
Tác giả Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad
Thể loại report
Định dạng
Số trang 604
Dung lượng 14,32 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Mapping to the Taxonomy 53Organization in the Context of an Enterprise Framework 53Enterprise Security and Risk Management Patterns 59Identification & Authentication I&A Patterns 62 Syst

Trang 2

Security Patterns Integrating Security and Systems Engineering

Markus Schumacher Eduardo Fernandez-Buglioni

Duane Hybertson Frank Buschmann Peter Sommerlad

Trang 3

Security Patterns

Trang 5

Security Patterns Integrating Security and Systems Engineering

Markus Schumacher Eduardo Fernandez-Buglioni

Duane Hybertson Frank Buschmann Peter Sommerlad

Trang 6

Copyright © 2006 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester,

West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): cs-books@wiley.co.uk Visit our Home Page on www.wiley.com

All Rights Reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted

in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to permreq@wiley.co.uk, or faxed to (+44) 1243 770620.

Designations used by companies to distinguish their products are often claimed as trademarks All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners The Publisher is not associated with any product or vendor mentioned in this book This publication is designed to provide accurate and authoritative information in regard to the subject matter covered It is sold on the understanding that the Publisher is not engaged in rendering professional services If professional advice or other expert assistance is required, the services of a competent professional should be sought.

Other Wiley Editorial Offices

John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA Wiley-VCH Verlag GmbH, Boschstr 12, D-69469 Weinheim, Germany John Wiley & Sons Australia Ltd, 42 McDougall Street, Milton, Queensland 4064, Australia John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01, Jin Xing Distripark, Singapore 129809 John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke, Ontario, Canada M9W 1L1 Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic books.

Library of Congress Cataloging-in-Publication Data

Security patterns : integrating security and systems engineering / Markus Schumacher [et al.].

p cm.

Includes bibliographical references and index.

ISBN-13: 978-0-470-85884-4 (cloth : alk paper) ISBN-10: 0-470-85884-2 (cloth : alk paper)

1 Computer security 2 Systems engineering I Schumacher, Markus

QA76.9.A25S438 2005 005.8 dc22

2005026865

British Library Cataloguing in Publication Data

A catalogue record for this book is available from the British Library ISBN-13 978-0-470-85884-4 (HB)

ISBN-10 0-470-85884-2 (HB) Typeset in 10/12pt Sabon by Laserwords Private Limited, Chennai, India Printed and bound in Great Britain by Anthony Rowe Ltd, Chippenham, Wiltshire This book is printed on acid-free paper responsibly manufactured from sustainable forestry

in which at least two trees are planted for each one used for paper production.

Trang 7

For you, dear reader!

Go and create secure software systems.

Markus

To Minjie, Lian, and Anna.

Eduardo

For my wife, Diane, for making considerable sacrifice to

allow me to work on this book.

Trang 9

Patterns Resolve Problems and Shape Environments 6

Trang 10

Mapping to the Taxonomy 53Organization in the Context of an Enterprise Framework 53

Enterprise Security and Risk Management Patterns 59Identification & Authentication (I&A) Patterns 62

System Access Control Architecture Patterns 69

Related Security Pattern Repositories Patterns 83

Security Needs Identification for Enterprise Assets 89

Trang 11

Vulnerabilities of IP Telephony Components 488

Trang 12

Securing IP telephony with patterns 493

Conclusion 500

Security Principles and Security Patterns 504Enhancing Security Patterns with Misuse Cases 525

Trang 13

Foreword

Security has become an important topic for many software systems With the ing success of the Internet, computer and software systems have become more andmore networked Researchers are already developing scenarios in which millions ofdevices are connected and cooperatively running web-based commerce, government,health, and other types of security-sensitive systems Much of the research effort inthese scenarios is devoted to security aspects

grow-What could happen if, in a pervasive health scenario, cardiology data collected bywireless sensors attached to your body and pre-processed by software on your PDA

is intercepted and manipulated by an unauthorized person during its transmission toyour doctor? Or think of a scenario in which the software in your car is updated re-motely because an attacker has compromised the manufacturer’s servers What ifyour car, which has just been ‘updated,’ no longer brakes, but instead activates itsdrive-by-wire accelerator? What if, in the near future, the control tower that justtook over handling of the aircraft in which you are a passenger discovers that theplane no longer does what the pilots or the tower want, but, instead, what some hi-jackers want it to do? Perhaps worst of all, think about potential for disaster shouldsomeone maliciously take over control of a nuclear power plant…

You simply do not want these things to happen! In other words, you require thesystem to ensure a proper level of confidentiality and integrity before you trust anduse it

Although the importance of security is widely acknowledged, only a few projectsaddress it with the appropriate priority Security is still an afterthought in manyprojects Check the latest security articles in your favorite IT magazine, and you willfind reports of successful intrusions into, or denial of service attacks against, all sorts

of enterprise-level systems—which, ironically enough, are often not performed byexperts, but by high-school kids or students via very simple measures like scripts

So why is there this discrepancy between the acknowledgement of security andits prioritization in software development? Certainly not because security is still an

Trang 14

unexplored field in software Moreover, security requirements are often expressedvaguely or not at all, and software architectures often expose limited security-related decisions To survive in today’s networked and open computing world, it iscrucial to go beyond the realms of authentication.

Project managers, software architects, developers, testers, and other stakeholders

of a software system need to ensure that security is an integral part of all softwareprojects

This is where the book you are holding steps in Unlike other books on the marketthat tend to cover the latest research ideas and new security technologies, this newbook covers real-world knowledge and experience from international security ex-perts It uses patterns, a successful and widely adopted technology for describing,communicating, and sharing knowledge The authors guide you through the field ofsecurity, address key questions, and clearly show you how to build secure systems,and present corresponding proven solutions

For example, how do you identify an organization’s or system’s security needs, andhow do you define an appropriate security approach to meet these needs? Is confi-dentiality a security property you need in your system, or integrity, availability, oraccountability? Or even a mixture of the four? And how do you ensure these prop-erties by appropriate means of prevention, detection, and response? Via identifica-tion and authentication (I&A)? Or do you also need a means of access control andauthorization in your systems, or even accounting and auditing? And how do all ser-vices interact to provide a consistent and coherent security concept for your system?Once you know what security services you need and how they interoperate, what aretheir different realization options? For example, is a password-based or a PKI-basedI&A appropriate to meet your security needs? And what different options are avail-able to you? Smart cards? RFID tags? Or is it sufficient that you provide a log-onservice for your system that requests your user ID and password?

You can imagine such a list of questions can be continued and detailed, not onlyfor identification and authentication, but also for all other security services andmechanisms that can be provided: access control and authorization, accounting andauditing, and so on

So while security is a wide and non-trivial field, it is nevertheless important thatyou address it appropriately in order to build successful software systems Ignoringsecurity due to lack of overview and knowledge could be catastrophic I’m not a se-curity expert, but after working on this book I had a much better understanding ofthe topic, allowing me to address it more explicitly, more prominently, and more con-structively in my daily work as a software architect

In addition to the technical value and contribution of this book, there is anotheraspect that makes it special This book has been written from the heart of the pat-terns community All its authors have carefully crafted the scope of their patterns

to avoid overlap, and they have integrated all the relationships between the terns to ensure a common look-and-feel The result is a network of complementary,mutually-supporting patterns that provide a solid coverage of important security

Trang 15

pat-areas The value of this network is significantly bigger than the sum of the values ofall its constituent patterns: you get the whole picture, not just its individual bits andpieces.

Finally, I’d like to invite you to take the opportunity to read and enjoy the patternspresented in this book I hope that the security issues prove relevant for your systems,enrich your design knowledge, and enhance your overall understanding of security I’m sure you’ll like this book as much as I do

Frank Buschmann

Senior Principal Engineer Siemens AG, Corporate Technology

Trang 17

About this Book

Much attention has recently been devoted to security issues, and it has become parent that a high security level should be a fundamental prerequisite for all businessprocesses—both in the commercial and public sector The steadily increasing number

ap-of reported security incidents indicates that organizations need additional help in dressing basic security issues, ranging from enterprise plans through software sys-tems to operational practices

ad-In general, security is not adequately addressed in enterprises and the systems thatthey build and operate One reason is that security covers a broad area: it is a bigchallenge to define secure business processes and to develop and operate the corre-sponding systems and applications securely The situation is becoming more chal-lenging because of the increasing openness of systems and enterprises, due largely tothe rise of the Internet and e-business technologies It is very difficult achieve security,especially in distributed environments, as there are many different organizations,individuals, technical components and mechanisms involved In addition, trust rela-tionships change frequently, which makes a complete analysis of security require-ments very hard As modern business processes become more and more complex, theoverall problem space is no longer easily comprehensible for the people involved.Specifically, there are three key issues:

■ Security is often an afterthought in system design and implementation The terprise context and requirements that drive system security are not addressedexplicitly, and are not incorporated into system architectures What is needed

en-is to begin to address security up-front, rather than the ‘repair-service’ proach we observe today

ap-■ Many security breaches can be traced back to well-known security problemsthat still appear over and over again Default passwords that are documented

in the software manual are one example Storing sensitive information on apublic Web server is another example These are manifestations that security is

Trang 18

being given a low priority, or of a lack of understanding of security issues Thedominant goal in these cases is to enhance functionality and performance, not

is an unnecessary waste of their time, and keeps them from addressing morecomplicated problems

The key to addressing these issues is that—while many security problems are new

or complicated—a significant number of basic security problems in an enterprisecontext are well understood, and well-established solutions exist for them Overtime, the security specialists who have encountered the same basic problems andfound themselves repeating the same basic solutions have developed a good under-standing of these problems and solutions To some degree, these have been captured

in the security literature and in security-related standards But the knowledge fied in the literature and standards is not readily accessible to those who do not de-vote full time to security

codi-The purpose of this book is to capture some of these basic problems and solutions,and to make them available in a form usable by enterprise planners, system architectsand developers, and operations managers What form would make this knowledgeaccessible and easy to apply? How can we learn from previous errors and make prov-

en, working solutions to recurring problems available to everyone?

The approach in this book is to apply the idea of patterns, which are an established

software development technique The basic idea behind patterns is to capture expertknowledge in the form of documentation with a specific structure containing provensolutions for recurring problems in a given domain In particular, security patternscan be used when the people responsible for enterprises or systems have little or nosecurity expertise This allows them to address basic security issues themselves, in-stead of depending on security specialists to perform this task for them each time.This frees security specialists to help solve new or more complex security problems.People will probably continue to develop and use second-class security solutions.Even relatively unskilled computer users, if they are intent on hacking, are able to carryout damaging attacks using widely-available scripts Developing first-class solutions

is an enormously difficult problem, exhibiting too many cases of inadequate ments, ill-formed design concepts, poor architectures, inadequate specifications, im-mature software development practices, overdependence on system administration,poor operations, and uninformed top management The earlier we start to treat secu-rity as an equivalent requirement with the appropriate priority, the quicker our know-how and skills about seamless security solutions will evolve This would considerably

Trang 19

require-reduce the residual risk of using software applications and systems in sensitive ronments More and more we depend on having secure systems, and we need system-atic solutions Our belief is that security patterns are a step in this direction.

envi-The Book’s Intended Audiences

This book is intended for anyone who has a little knowledge of security but whoneeds to incorporate basic security functions into his organization or system, eitherbecause they are required to do so, or because they understand the importance of se-curity The book is also useful for specialists to use as a design guide, to compare sys-tems, and to teach about systems

In particular, we address the following audiences:

■ At the enterprise level, everyone who is or should be interested in enterprise curity, such as enterprise planners, enterprise architects, strategists, and policymakers, as well as business process engineers and business process re-engineer-ing specialists The main issue for these groups is to understand how to definebasic enterprise security needs and constraints Security patterns for this target

se-group are presented in Chapter 6, Enterprise Security and Risk Management.

We also recommend that they look at the patterns that are described in ters 7 to 13, to understand how enterprise security plans are reflected or satis-fied in enterprise operations

Chap-■ At the IT system level, system architects, software designers and developers,project managers, product vendors, service suppliers and others interested insystem security These groups have to understand how to design basic systemsecurity functions and incorporate them into system architectures and designs,and how to select among alternative security solutions We have compiled a set

of corresponding security patterns in Chapters 7 to 13 At this level it is alsoimportant to understand the enterprise security constraints described in Chap-

ter 6, Enterprise Security and Risk Management, and how they affect system

security requirements

■ At an operational level, operations managers, operations staff, and other ple interested in operations security Their interest is to understand how to de-fine and adopt basic security practices in enterprise and system operations

peo-Relevant security patterns are discussed in Chapter 7, Identification and thentication (I&A), Chapter 10, Operating System Access Control, Chapter

Au-11, Accounting, Chapter 12, Firewall Architectures, and Chapter 13, Secure Internet Applications.

It is clear that all these levels interact, and a complete understanding of securityrequires some degree of understanding of all of them

Trang 20

There are further groups who may find the book useful, and can read any chapters

■ Researchers, teachers, and students can use the book to understand currentbest practice in security They may also find potential areas for extensions toour approach For example, they could examine the security taxonomy to findareas not covered by current patterns Advantages of security patterns for thistarget group could include their use in the design of new systems, understand-ing of complex systems, comparison of systems, and for teaching purposes: se-curity patterns are used in university security courses, for example

■ Security auditors can improve their understanding using this new

representa-tion of best security practice The collecrepresenta-tion of patterns also include forces and

liabilities to watch for: in the Patterns community, we use the term ‘forces’ todescribe goals and constraints that reveal the intricacies of a problem and de-fine the kinds of trade-offs that must be considered in the presence of the ten-sion or dissonance they create

■ Government acquisition or procurement specialists might get help in standing a new representation of best security practice that can be included in

under-an acquisition document such as a Request for Proposal or Statement of Work

Structure of the Book

The first chapter, The Pattern Approach, provides a general introduction to the

over-all pattern paradigm In addition to a discussion of the pattern approach, the chapterpresents the pattern template we use in the book

Chapter 2, Security Foundations, introduces key security concepts We provide a

general overview of security, followed by a taxonomy of security areas and a set ofgeneral security resources

Applying patterns to the area of security results in a new, domain-specific pattern

type: security patterns In Chapter 3, Security Patterns, we outline how security

pat-terns have evolved, and describe their distinguishing characteristics We also discuss thebenefits of using security patterns, and data sources for identifying security patterns

Chapter 4, Patterns Scope and Enterprise Security, describes the scope and context

of security patterns and explains how they are organized in the book

Trang 21

Chapter 5, The Security Pattern Landscape, presents thumbnails for all the

pat-terns in this book, as well as related security patpat-terns that we reference, but are notcontained in the book In many cases these are published elsewhere

Chapters 6 through 13 present the security patterns themselves

In Chapter 6, Enterprise Security and Risk Management, we present security

pat-terns at the enterprise level These patpat-terns emphasize the security considerationsthat planners need to incorporate into their development of enterprise-level strategy,planning activities, business models, goals, and policies

Chapter 7, Identification and Authentication (I&A), introduces service patterns

that support aspects of the I&A service and selected individual patterns in this tem Identification and Authentication (I&A) services address the task of recognizing

sys-an actor—that is, a user, a process or sys-any other system—that is interacting with abusiness system

Chapter 8, Access Control Models, presents patterns that specify accepted

access-control models as object-oriented, declarative patterns that can be used as guidelines

in the construction of secure systems There is also a pattern that documents the namics of evaluating requests according to the constraints defined by the declarativemodels Finally, we also show a pattern that helps to find the rights associated withroles in a role-based access control (RBAC) model

dy-Chapter 9, System Access Control Architecture, presents access-control patterns at

the architectural level There is a pattern that shows why and how to gather the derlying requirements for a system under consideration from a generic set of accesscontrol requirements The remainder of this chapter contains patterns that deal withthe architecture of software systems to be secured by access control

un-Chapter 10, Operating System Access Control, presents patterns for access control

services and mechanisms targeted at operating systems that describe how the operatingsystem controls access to resources such as memory address spaces and I/O devices

Chapter 11, Accounting, presents patterns for audit and accounting services and

mechanisms Decision makers need to be aware of any security events that occur thatinvolve their assets This need is addressed by security audit and accounting patterns

Chapter 12, Firewall Architectures, presents a pattern language for describing

dif-ferent types of firewalls This language can be used as a guide to select a suitable wall type for a system or to help designers build new firewalls

fire-Chapter 13, Secure Internet Applications, presents patterns for Internet security that specialize patterns from Chapter 8, Access Control Models, and Chapter 12, Firewall Architectures, within the domain of Internet applications.

Chapter 14, Case Study: IP Telephony, presents a case study of an emerging

tech-nology that demonstrates how to use security patterns to incorporate security intoreal-world system engineering scenarios The most appropriate patterns of this bookare applied to selected use cases in IP telephony systems

Chapter 15, Supplementary Concepts, discusses selected complementary concepts

that can be used in conjunction with security patterns In particular, we present thepattern-related notion of security principles and so-called ‘misuse cases.’

Trang 22

Chapter 16, Closing Remarks, provides our conclusions and an outlook on future

work that deals with security patterns and related concepts

Guidelines for the Reader

In addition to the obvious option of reading the book from cover to cover, you canchoose alternative paths though the book

This book is divided in three parts The first part, which comprises Chapters 1through 3, provides relevant background information about security patterns If you

are not familiar with patterns, read Chapter 1, The Pattern Approach, which

con-tains a brief introduction to the ideas behind software patterns If you are not

famil-iar with security, read Chapter 2, Security Foundations, which provides basic concepts and pointers to sources of detailed security knowledge Based on that, Chapter 3, Se- curity Patterns, discusses the notion of security patterns.

The second part of the book, Chapters 4 through 13, contains a catalog of selectedsecurity patterns that address different topics You can work through the catalogchapter by chapter to get an impression of typical security problems and proven so-lutions that occur at the different levels

To understand how security patterns can be organized, read Chapter 4, Patterns Scope and Enterprise Security, which builds on our security taxonomy If you want

to get a quick overview of our security patterns, as well as related security patterns

that are not presented in this book, read Chapter 5, The Security Pattern Landscape.

This chapter can be used as a reference and a navigation tool

Reading the patterns in Chapters 6 through 13 can be done in any desired quence, or with any desired subset of the patterns Within a given pattern, the key

se-topics to read are Context, Problem, and Solution The other parts of the patterns

are optional and provide further information about implementing the pattern Wealso identify the relationships between the patterns You can therefore also start withany pattern and use the references to related patterns to navigate through the book

If you have read the introductory chapters and security patterns are new to you,

we suggest that you start with security patterns that are easy to understand and thatare used in many situations Examples are:

■ Password Design and Use (217)

■ Single Access Point (279)

■ Front Door (473)

In the third part of the book we discuss applications, extensions and future rections of a pattern-based security approach If you are looking for examples thatdescribe how security patterns can be applied, look at the case study provided in

Trang 23

di-Chapter 14, Case Study: IP Telephony If you are interested in techniques that can

complement or augment the concept of security patterns, have a look at a few

ex-amples in Chapter 15, Supplementary Concepts Conclusions and a look at the ture of this work are given in Chapter 16, Closing Remarks As these chapters build

fu-on the patterns in the book, you should read them last

Trang 25

About the Authors

Many people contributed to this book In this section we provide short biographies

of all the authors and editors in alphabetical order We also show briefly who tributed to which part of the book Finally, we express our thanks to all the otherpeople that helped to bring this book to a successful conclusion

con-Short Biographies

Frank Buschmann

Frank Buschmann is Senior Principal Engineer at Siemens Corporate Technology inMunich, Germany His research interests include object technology, software archi-tecture, frameworks, and patterns He has published widely in all these areas, most

visibly in his co-authorship of the first two POSA volumes, A System of Patterns and Patterns for Concurrent and Networked Objects Frank was a member of the ANSI

C++ standardization committee X3J16 from 1992 to 1996 He initiated and nized the first conference on patterns held in Europe, EuroPLoP 1996, and is also aco-editor of the third book in the PLoPD series by Addison-Wesley In his develop-ment work Frank has led design and implementation efforts for several large-scaleindustrial software projects, including business information, industrial automation,and telecommunication systems In addition, Frank serves as the series editor forWiley’s series in software design patterns

Trang 26

development of a multi-level operating system for the Defense Information SystemsAgency (DISA), and supported the development of high-level security architectures forthe US Treasury Department, which included a focus on issues and uses of enterprise-wide directory services for the Internal Revenue Service (IRS) Some of her recent re-search has included studies of procedures to support the true integration of securityinto an enterprise architecture Susan retired from MITRE in September 2003.

as EuroPLoP and OT

Ben Elsinga

Ben Elsinga is a specialist in information architecture and information security Hehas carried out several assignments in the areas of risk analyses, security architec-ture, as well as acting as an interim security manager and a lecturer on informationsecurity courses Within Capgemini Benelux, Ben led all research and informationsecurity development activities He created a competence network of security special-ists and consultants, and is member of the board of the Dutch information securitysociety (GvIB) The vision Ben has is that information security should be integratedinto every change, and that humans are the weakest link in the chain He feels verycomfortable in dynamic environments and from an innovative and result-driven at-titude he likes to create new and secure business solutions In an environment thatcontains the combination of system development and information security, Bentakes responsibility for a team of specialists to fulfill challenging assignments He is

a Capgemini certified senior IT architect, specialized in system development and formation security Ben successfully passed a B-screening by the Dutch government,and he is also a certified Prince-2 practitioner and is also a certified CISSP in infor-mation security

Trang 27

in-Eduardo B Fernandez

Eduardo B Fernandez (Eduardo Fernandez-Buglioni) is a professor in the ment of Computer Science and Engineering at Florida Atlantic University in BocaRaton, Florida He has published numerous papers on authorization models, object-oriented analysis and design, and fault-tolerant systems He has written three books

Depart-on these subjects He has lectured all over the world at both academic and industrialmeetings, and has created and taught several graduate and undergraduate coursesand industrial tutorials His current interests include security patterns and Web Ser-vices security He holds an M.S degree in Electrical Engineering from Purdue Uni-versity and a Ph.D in Computer Science from UCLA He is a Senior Member of theIEEE, and a Member of ACM He is an active consultant for industry, including as-signments with IBM, Allied Signal, Motorola, Lucent, and others

Mei Fullerton

Mei Fullerton recently completed her M.S in Computer Science at Florida AtlanticUniversity (May 2005) Since then she has worked as a software engineer at OfficeDepot, Delray Beach, Florida

Manuel Görtz

Manuel Görtz is a researcher in the field of context-aware communication services

He holds an M.Sc (Diplom) in Electrical Engineering and Information Technologyfrom the Technischen Universität Darmstadt (TUD) He joined the Multimedia Com-munication Lab headed by Prof Ralf Steinmetz at TUD in 2000 He recently receivedhis Ph.D in Electrical Engineering and Information Technology on the topic of ‘Ef-ficient Real-time Communication Services Utilizing Contexts.’

Manuel Görtz has actively working in the area of Voice over IP for many years

He was a member of the task-force that hosted the IP telephony trial for the stadt scientific region, analyzing security threads and operational issues He hasworked for many years in industry projects to design and prototype communicationsolutions for the future Manuel is an author of numerous peer-reviewed papers andseveral invention reports His key expertise lies in the domain of signaling, advancedcommunication services and security patterns

Darm-Jody Heaney

Jody Heaney is a Principle InfoSec Engineer in the Information Security Center at theMITRE Corporation in McLean, VA She has been involved in many different pro-gram areas, including work with DARPA, the National Security Agency (NSA), allbranches of the military, the Intelink Management Office (IMO), and the Intelligence

Trang 28

Community (IC) She has conducted research into the foundations of information surance (IA) and has published papers on security modeling and access control Shewas one of the original developers of the System Security Engineering Capability Ma-turity Model (CMM) and NSA’s Information Assurance Technology Framework(IATF) In her current IA leadership role for the IC CIO, the focus is on identifyingcross-cutting IA technologies suitable for the entire IC, especially for cross-security-domain technologies, and information sharing She has maintained a strong interest

as-in as-integratas-ing as-information systems security as-into the maas-instream of software and tems engineering processes

sys-Aaldert Hofman

Aaldert Hofman has elaborate knowledge and experience in sophisticated and plex information systems He graduated in Informatics at Twente University in En-schede, the Netherlands and joined Capgemini in January 1990 During the firstyears of his career he was involved in the architecture of large administrative systemswithin social security Since 1997 he has been assigned to projects in banking and in-surance services His expertise is in both architecture and security He oversees thecomplexity in these fields and is able to align business to available IT resources.Aaldert is experienced in bridging the gap between business and IT both in his as-signments and his coaching in architecture and security Aaldert has been interested

com-in the use of patterns scom-ince the famous GoF book on Design Patterns Workcom-ing com-in

knowledge-intensive areas such as identity management and information security, hewas convinced that knowledge capture by the use of patterns could be very helpful

He therefore joined the security patterns community during 2001, together with hiscolleague Ben Elsinga They submitted security patterns to EuroPLoP 2002 and

2003, where they met the editors of this book and discussed their ideas In theirprojects the use of security patterns has lead to better control of access rights, im-proving quality and time-to-market

Duane Hybertson

Duane Hybertson is a researcher and member of the technical staff in the Center forInnovative Computing and Informatics at the MITRE Corporation in McLean, VA

He has a broad background in software engineering, both in research and practice

He has conducted research into the foundations of systems architecture, and haspublished papers on a uniform modeling approach to architecture and software engi-neering He has supported architecture development and helped to define evolution-ary processes for large information systems at the National Geospatial-IntelligenceAgency (NGA), which supports both the US Department of Defense (DoD) and theintelligence community He has applied architecture and modeling concepts to enter-prise engineering, and is extending the model-oriented approach to complex systems

Trang 29

His recent research has been in capturing security patterns and determining how tointegrate these patterns into a usable enterprise engineering context.

Malcolm Kirwan, Jr.

Malcolm Kirwan, Jr is a Lead Software Systems Engineer and Scientist at the MITRECorporation in McLean, VA Malcolm has spent his career performing activitiesthroughout all phases of the systems and software development lifecycles His expe-rience ranges from designing and developing software for real-time embedded sys-tems and simulation systems, to designing and incorporating security solutions intoenterprise and system architectures

Maria M Larrondo-Petrie

Dr Larrondo-Petrie is Associate Dean of Engineering and Professor of Computer ence & Engineering at Florida Atlantic University (FAU), and a member of the SecureSystems Research Group at FAU She serves on the ASEE Minority Division Board,

Sci-is Vice President of Research of the Latin American and Caribbean Consortium ofEngineering Institutions, was on the ACM SIGGRAPH Education Board and wasPresident of Upsilon Pi Epsilon Honor Society for the Computing Sciences

Trang 30

chap-Ann Reedy

Ann Reedy is a researcher and member of the technical staff in the Center for vative Computing and Informatics at the MITRE Corporation in McLean, VA Shehas a broad background in both software engineering and enterprise architecture.She has supported the development of both enterprise architecture frameworks andenterprise architectures for DoD and a broad range of civil agencies In addition toher recent research work on security patterns at MITRE, she has been working withSyracuse University in integrating security and enterprise engineering concepts insupport of the Federal Enterprise Architecture Security and Privacy Profile She iscurrently involved in providing enterprise architecture courses through the MITREInstitute and the Federal Enterprise Architecture Certification Institute

Inno-Naeem Seliya

Naeem Seliya completed his Ph.D in Computer Science at Florida Atlantic

Universi-ty in July 2005 His dissertation work was about the classification of error-pronesoftware modules

Sasha Romanosky

Sasha Romanosky, CISSP, holds a Bachelor of Science degree in Electrical ing from the University of Calgary, Canada and is currently pursuing graduate stud-ies in Information Security at Carnegie Mellon Sasha has been working with Internetand security technologies for over eight years, predominantly within the financialand e-commerce industries at companies such as Morgan Stanley and eBay He co-

Engineer-authored the book J2EE Design Patterns Applied and has published other works on

security patterns Recently, Sasha collaborated with other leading industry sionals to develop the Common Vulnerability Scoring System (CVSS), an open frame-work for scoring computer vulnerabilities His current research interests include vul-nerability management and security metrics His passion is information security.Sasha would like to thank his shepherds Duane Hybertson and Aaldert Hofman, aswell as Markus Schumacher, for his vision in this book Finally, Sasha would like tothank Theresa for her never-ending love and support

profes-Markus Schumacher

Markus Schumacher studied Electrical Engineering and Information Technology atthe Darmstadt University of Technology (TUD) After finishing his studies in 1998,

he was the leader of the IT Transfer Office (ITO) team that was—and still is—engaged

in numerous national and international research projects in cooperation with known companies and public institutions that include SAP AG, T-Systems, Fujitsu

Trang 31

well-Laboratories, Digital Equipment Corporation, Siemens, Tenovis/Bosch Telecom, andthe European Union He planned and organized the ‘Hacker Contest’ in which par-ticipants alternately play the roles of ‘attacker’ and system administrator, therebylearning basic modes of attack as well as how to secure applications, operating sys-tems and networks against them The course is still offered by Markus’ former col-leagues Springer Verlag has published the results of this course as a book in theXpert Press series In May 2003, Markus finished his dissertation about ‘Security En-gineering with Patterns’, also published by Springer in the LNCS series In 2003,Markus joined the Product Security team of SAP AG in Walldorf, Germany There

he led a Common Criteria certification project, was responsible for reporting thecompliance of SAP NetWeaver to the SAP product standard for security, and was ateam member in the SAP Security Response team In July 2005 he joined SAP’s Re-search and Breakthrough Innovation division, where the new Business Process Plat-form (BPP), as well as new BPP-based solutions, are being developed

Guttorm Sindre

Guttorm Sindre is Professor of Information Systems in the Department of Computerand Information Science, Norwegian University of Science and Technology He is theauthor and co-author of more than fifty articles in refereed international journals orconferences His primary research fields are requirements engineering, conceptualmodeling, and information systems development He serves as a reviewer for inter-national journals and on the program committees of renowned international confer-ences and workshops

From 1997 on Peter has practiced patterns and Agile software development inSwitzerland In the late 1990s he and his team implemented Internet applications andsecurity infrastructure for the Swiss financial industry

In addition to teaching and programming, Peter writes patterns and shepherds

oth-er pattoth-ern authors He is memboth-er of Hillside Group, Hillside Europe, the Swiss ware Engineering Network SWEN, ACM and the IEEE Computer Society

Soft-Peter’s major acknowledgement goes to his wife Andrea: ‘Without her love andcare I would no longer be in this world.’ Peter is a leukemia survivor, so he is grateful

to Professor Hans-Jochem Kolb and his team at the Jose-Carreras transplantationunit in Munich for their care and support during his treatment He encourages allreaders to become registered stem-cell donors to help other leukemia patients

Trang 32

Peter’s appreciation for this book goes to his co-editors and co-authors, for theirfeedback and their encouragement over work on security patterns His special thanks

go to Joseph Yoder and Jeffrey Barcalow, for allowing him to put their patterns intoshape for this book

The Birth of this Book

In the very beginning it was Ben Elsinga who sent an e-mail to Markus Markus hadjust setup a Web page about security patterns on his site, and Ben liked this idea.Shortly after that, Eduardo shepherded Markus’s first paper about security patternsfor PLoP 2001 and the idea for the book was born This was the beginning of a closerdiscussion about security patterns, and resulted in the first Focus Group ‘Thinkingabout Security Patterns’ at EuroPLoP 2001 There, a mini-community came togetherand started to work: Juha Pärsinnen, Sami Lehtonen, Ben Elsinga, Frank Buschmann,Eduardo Fernandez, Duane Hybertson, Markus Schumacher, Manuel Görtz, andAaldert Hofman At this conference Duane and Frank joined the team of editors Ayear later, most of the group met again for a second Focus Group at EuroPLoP 2002,which laid the foundations for this book At this conference there was a dedicatedworkshop for security patterns and Peter Sommerlad, another co-author of POSA1,joined the editorial team This was very important, as he is both a pattern enthusiastand a security practitioner Beside these face-to-face workshops, Sasha Romanoskyjoined the community by e-mail

The end of this story is this book which is the result of three years of work bytwenty-one people, and we are very proud that it is in your bookshelf now It would

be even better to put it on your desk

Who Wrote What?

The editors wrote the introductory chapters as well as the last chapter Markus macher compiled and integrated all material of the book Frank contributed Chapter 1,

Schu-The Pattern Approach, offered his rapid shepherding skills and was a good advisor

in critical phases Duane and Eduardo contributed to Chapter 2, Security tions Duane, Eduardo, and Markus wrote Chapter 3, Security Patterns Many thanks to Aaldert Hofman and Ben Elsinga who contributed Section 3.3, Why Secu- rity Patterns?.

Founda-Chapter 4, Patterns Scope and Enterprise Security was written by the MITRE

Team, namely Jody Heaney, Duane Hybertson, Susan Chapin, Malcolm Kirwan Jr

and Ann Reedy Chapter 5, The Security Pattern Landscape was the joint idea of the

editors and some of the authors, and was compiled by Duane and Markus The TRE team and Sasha Romanosky contributed the introduction and the patterns for

MI-Chapter 6, Enterprise Security and Risk Management All the patterns in MI-Chapter 7,

Trang 33

Identification and Authentication (I&A) were written by the MITRE team All the patterns in Chapter 8, Access Control Models were written by Eduardo B Fernan-

dez: the ROLE-BASED ACCESS CONTROL (249) pattern was co-authored by Mei lerton The author of the ACCESS CONTROL REQUIREMENTS (267) pattern in Chapter

Ful-9, System Access Control Architecture is the MITRE team The other patterns in this

chapter are based on a pattern language of Joseph Yoder and Jeffrey Barcalow and

have been rewritten for this book by Peter Sommerlad Chapter 10, Operating tem Access Control was written by Eduardo B Fernandez and Chapter 11, Account- ing was contributed by the MITRE team The patterns in Chapter 12, Firewall Ar- chitectures have been jointly written by Eduardo B Fernandez, Maria M Larrondo-

Sys-Petrie, Naeem Seliya, Nelly Delessy-Gassant, and Markus Schumacher The patterns

in Chapter 13, Secure Internet Applications were contributed by Andy Longshaw,

Paul Dyson and Peter Sommerlad

Chapter 14, Case Study: IP Telephony was written by Manuel Görtz Aaldert man and Ben Elsinga wrote Section 15.1, Security Principles and Security Patterns of Chapter 15, Supplementary Concepts Andreas L Opdahl and Guttorm Sindre wrote Section 15.2, Enhancing Security Patterns with Misuse Cases.

Trang 35

We thank Rick Dewar, Ralph Johnson, Munawar Hafiz, Craig R.P Heath, Peter

G Neumann, Dan Thomsen, and Joseph Yoder for their insightful comments on lier versions of our work The comments of all the reviewers helped us to shape andpolish the contents of the book Acknowledgements to those people who helped withthe improvement of specific patterns are also given at the end of each introduction

ear-to the pattern chapters

Special thanks also go to the Wiley team who supported us throughout this project:Gaynor Redvers-Mutton who encouraged us to go ahead and smoothly handed over

to Sally Tickner, Sarah Corney, Jonathan Shipley, David Barnard, Drew Kennerley,Fleur Hamilton, and Nick Mannion We would also like to thank our copy editor,Steve Rickaby

All those that have been forgotten—please accept our deepest and honest gies, we owe you (at least) a beer from the Kloster Irsee brewery Everything that isgood is the result of a good idea and a great team that realized it, and a great com-munity that supported it If you, dear reader, find a ‘bug’ in this book, blame us, theeditors

Trang 37

CHAPTER

1

It is not necessarily complicated It is not necessarily simple Christopher Alexander, in ‘The Timeless Way of Building’

In this chapter we introduce the concepts of patterns and two approaches to nizing and connecting them: pattern systems and pattern languages In addition, weoutline the major application areas and purpose of patterns, as well as their history

orga-in the software community Last, but not least, we discuss how patterns are morga-ined,documented, and prepared for publication and presentation

Trang 38

1.1 Patterns at a Glance

Developer enthusiasm for patterns has been almost unquenchable since the release

of the seminal work by the Gang-of-Four1 [GoF95] just a decade ago Softwaredevelopers from around the world leapt on the ‘new idea,’ with the hope that pat-terns would help them untangle tricky problems into a well-knit solution—somethingwith elegance, directness, and versatility Patterns found their way into many soft-ware development projects A movement had begun It was, and still is, thriving

A major reason for the success of patterns is that they constitute a ‘grass roots’ tiative to build on, and draw from, the collective experience of skilled designers It isnot often that a new development project tackles genuinely new problems that de-mand truly novel solutions Developers may sometimes arrive at similar solutions in-dependently or often recall a similar problem they solved successfully in a differentsituation, reusing its essence and adapting its details to resolve the new problem Ex-pert developers can draw on a large body of such solution schemes for both commonand uncommon design problems This practical experience guides them when build-ing new applications

ini-Distilling commonalities from the pairing of application-specific design problemsand their solutions leads comfortably to the concept of patterns: they capture these so-lutions and their relationship to the problem, framing them in a more readily-accessibleform From a very general birds-eye perspective, a pattern can be characterized as:

A solution to a problem that arises within a specific context

Though this characterization captures every pattern’s main structural property well,

it does not tell the whole story The context-problem-solution trichotomy is sary for a specific concept to qualify as a pattern, but it is not sufficient In particular,

neces-it does not specify how to distinguish a true pattern from an ‘ordinary’ solution to aproblem In fact, it requires much more for a software concept to be a true pattern:

■ A pattern describes both a process and a thing: the ‘thing’ is created by the

‘process’ [Ale79] For most software patterns—thus also for security patterns—

‘thing’ means a particular high-level design outline or code detail, includingboth static structure and intended behavior In other words, a pattern is both aspatial configuration of elements that resolve a particular problem—or inwhich a particular problem does not arise—and a set of associated instructions

to create this configuration of elements most effectively

1 The authors of this book, Erich Gamma, Ralph Johnson, Richard Helm, and John Vlissides, are named after the ‘Gang-of-Four’ in Chinese politics.

Trang 39

■ A true pattern presents a high-quality, proven solution that resolves thegiven problem optimally Patterns do not represent neat ideas that mightwork, but concepts that have been applied successfully in the past over andover again Consequently, new ideas must first prove their worth in the line

of active duty, often many times, before they can truly be called patterns.Because they capture practice and experience, patterns can help novices toact with greater confidence and insight on modest-sized projects, as well assupporting experts in the development of large-scale and complex softwaresystems

■ Patterns support the understanding of problems and their solutions Presenting

a problem and a solution for it is not enough for a pattern, as this leaves severalimportant questions unanswered Why is the problem a hard problem? Whatare the requirements, constraints, and desired properties of its solution? Why

is the solution as it is and not something else? A good pattern does not withholdthis information The forces associated with its problem description providethe answer for the first two questions, and the discussion, or consequences, ofits solution the latter

■ Patterns are generic—as independent of or dependent on a particularimplementation technology as they need to be A pattern does not describe aparticular solution, a specific arrangement of components or classes dependent

on a particular programming paradigm or language, but a set of interactingroles that define an entire solution space Christopher Alexander puts it thisway [AIS+77]: ‘Each pattern describes a problem which occurs over and overagain in our environment, and then describes the core of the solution to thatproblem, in such a way that you can use this solution a million times over,without ever doing it twice the same.’

■ A pattern tells a story and initiates a dialog As every pattern presents timelessand proven experience, it tells a success story To be precise for softwarepatterns, a ‘successful software engineering story,’ to borrow an observationfrom Erich Gamma But a pattern is not only a story, it also initiates a dialogwith its readers about how to resolve a particular problem well—byaddressing the forces that can influence the problem’s solution, by describingdifferent feasible solutions, and finally by discussing the trade-offs of eachsolution option A pattern thus invites its readers to reflect on the problembeing presented: to think first and then to decide and act explicitly andconsciously

■ Patterns celebrate human intelligence Patterns are not automatic derivationsfrom problem ingredients to fully-baked solutions Patterns often tackleproblems in more lateral ways that can be indirect, unusual, and even counter-intuitive In contrast to the implied handle-turning nature of many rigiddevelopment methods, patterns are founded in human ingenuity andexperience

Trang 40

A true pattern exposes all of the above properties—if it is lacking any of them, it

is probably just a solution to a problem, and most likely a specific design and mentation decision for a specific system, but not a pattern Adapting the existing def-

imple-inition from the first volume of the Pattern-Oriented Software Architecture series

[POSA1], this leads to the following characterization of the notion of patterns:

A pattern for software architecture describes a particular recurring design problemthat arises in specific design contexts, and presents a well-proven generic solution for

it The solution consists of a set of interacting roles that can be arranged to formmultiple concrete design structures, as well as a process for creating any particularstructure

This general definition serves well for the purpose of this book, although we narrow

it to security patterns but also extend it to include enterprise and requirements terns as well as architecture

pat-1.2 No Pattern is an Island

Though each pattern focuses on providing a self-contained solution for resolving onespecific problem, patterns are not independent of one another In fact, there are manyrelationships between patterns [POSA1] The most important relationship is refine-ment: the solution proposed by a particular pattern can often be implemented withhelp of other patterns, which resolve sub-problems of the original problem To put

it in another way, ‘each pattern depends on the smaller patterns it contains and onthe larger patterns in which it is contained’ [Ale79] Other important relationshipsamong patterns are variation and combination [POSA1]

It is the relationships between the patterns, together with their genericity, that lows them to be combined and integrated with one another to form large softwarearchitectures and designs that are coherent and consistent in their whole as well as

al-in their details Conversely, without these relationships, patterns would only be able

to resolve isolated problems, with no, or at best limited, effect on a larger design oreven an entire software architecture [POSA4]

1.3 Patterns Everywhere

Software patterns can exist at any scale and for many problem areas In their earlydays—the mid 1990s—the focus was on object-oriented design patterns of generalapplicability The Gang-of-Four book [GoF95] presents the most widely-known pat-terns of this kind The scope of these patterns, however, had only a small impact on

Ngày đăng: 01/06/2014, 10:51

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[ITU03] International Telecommunication Union: H323: Packet-Based Multimedia Communication Systems, November 2000 Sách, tạp chí
Tiêu đề: H323: Packet-Based Multimedia Communication Systems
Tác giả: International Telecommunication Union
Nhà XB: International Telecommunication Union
Năm: 2000
[Jac92] I. Jacobson et al: Object-Oriented Software Engineering: A Use Case Driv- en Approach, Addison-Wesley Professional, 1992 Sách, tạp chí
Tiêu đề: Object-Oriented Software Engineering: A Use Case Driv-en Approach
Năm: 1992
[JBR99] I. Jacobson, G. Booch, J. Rumbaugh: The Unified Software Development Process, Addison-Wesley Professional, 1999 Sách, tạp chí
Tiêu đề: The Unified Software DevelopmentProcess
Năm: 1999
[Kru00] P. Kruchten: The Rational Unified Process: An Introduction, Third Edition, Addison-Wesley Professional, 2003 Sách, tạp chí
Tiêu đề: The Rational Unified Process: An Introduction
Năm: 2003
[Lea99] D. Lea: Concurrent Programming in Java, in Concurrent Programming in Java: Design Principles and Patterns, Second Edition, Addison-Wesley, 1999 Sách, tạp chí
Tiêu đề: Concurrent Programming in Java", in "Concurrent Programming inJava: Design Principles and Patterns
Năm: 1999
[LP01] S. Lehtonen, J. Parssinen: A Pattern Language for Key Management, in Pro- ceedings of PLoP, 2001 Sách, tạp chí
Tiêu đề: A Pattern Language for Key Management
Năm: 2001
[LS00] J. Lennox, H. Schulzrinne: Call Processing Language Framework and Re- quirements, RFC 2824, May 2000 Sách, tạp chí
Tiêu đề: Call Processing Language Framework and Re-quirements
Năm: 2000
[Mei03] J. D. Meier et al: Improving Web Application Security: Threats and Coun- termeasures, Microsoft, 2003 Sách, tạp chí
Tiêu đề: Improving Web Application Security: Threats and Coun-termeasures
Năm: 2003
[NIST800-30] G. Stoneburner, A. Goguen, A. Feringa: Risk Management Guide for Infor- mation Technology Systems, NIST Special Publication SP800-30, National Institute of Standards and Technology (NIST), 2001 Sách, tạp chí
Tiêu đề: Risk Management Guide for Infor-mation Technology Systems
Năm: 2001
[NIST800-33] G. Stoneburner: Underlying Technical Models for Information Technology Security: Recommendations of the National Institute of Standards and Technology {USA), NIST Special Publication SP800-33, National Institute of Standards and Technology (NIST), December 2001 Sách, tạp chí
Tiêu đề: Underlying Technical Models for Information TechnologySecurity: Recommendations of the National Institute of Standards andTechnology {USA)
Năm: 2001
[NIST800-35] T. Grance et al: Guide to Information Technology Security Services, NIST Special Publication NIST SP800-35, National Institute of Standards and Technology (NIST), 2003 Sách, tạp chí
Tiêu đề: Guide to Information Technology Security Services
Năm: 2003
[NIST800-63] W. E. Burr, D. F. Dodson, W. T. Polk: Electronic Authentication Guideline, NIST Special Publication NIST SP800-63, National Institute of Standards and Technology (NIST), 2004 Sách, tạp chí
Tiêu đề: Electronic Authentication Guideline
Tác giả: W. E. Burr, D. F. Dodson, W. T. Polk
Nhà XB: National Institute of Standards and Technology (NIST)
Năm: 2004
[NW01] J. Noble, C. Weir: Small Memory Software: Patterns for Systems with Lim- ited Memory, Addison-Wesley Professional, 2000 Sách, tạp chí
Tiêu đề: Small Memory Software: Patterns for Systems with Limited Memory
Tác giả: J. Noble, C. Weir
Nhà XB: Addison-Wesley Professional
Năm: 2000
[PLoPD1] J. O. Coplien, D. C. Schmidt (eds.): Pattern Languages of Program Design, Addison-Wesley Professional, 1995 (a book publishing the reviewed Pro- ceedings of PLoP, Monticello, Illinois, 1994) Sách, tạp chí
Tiêu đề: Pattern Languages of Program Design
Tác giả: J. O. Coplien, D. C. Schmidt
Nhà XB: Addison-Wesley Professional
Năm: 1995
[PLoPD2] J. O. Coplien, N. Kerth, J. Vlissides (eds.): Pattern Languages of Program Design 2, Addison-Wesley Professional, 1996 (a book publishing the re- viewed Proceedings of PLoP, Monticello, Illinois, 1995) Sách, tạp chí
Tiêu đề: Pattern Languages of ProgramDesign 2
Năm: 1995
[PLoPD3] R. C. Martin, D. Riehle, F. Buschmann (eds.): Pattern Languages of Pro- gram Design 3, Addison-Wesley Professional, 1997 (a book publishing se- lected papers from the Proceedings of PLoP, Monticello, Illinois, USA, 1996, the Proceedings of EuroPLoP, Irsee, Bavaria, Germany, 1996, and the Telecommunication Pattern Workshop at OOPSLA ’96, San Jose, Califor- nia, USA, 1996) Sách, tạp chí
Tiêu đề: Pattern Languages of Program Design 3
Tác giả: R. C. Martin, D. Riehle, F. Buschmann
Nhà XB: Addison-Wesley Professional
Năm: 1997
[POSA2] D. C. Schmidt, M. Stal, H. Rohnert, F. Buschmann: Pattern-Oriented Soft- ware Architecture – Patterns for Concurrent and Networked Objects, John Wiley & Sons, 2000 Sách, tạp chí
Tiêu đề: Pattern-Oriented Software Architecture – Patterns for Concurrent and Networked Objects
Tác giả: D. C. Schmidt, M. Stal, H. Rohnert, F. Buschmann
Nhà XB: John Wiley & Sons
Năm: 2000
[POSA3] P. Jain, M. Kircher: Pattern-Oriented Software Architecture – Patterns for Resource Management, John Wiley & Sons, 2004 Sách, tạp chí
Tiêu đề: Pattern-Oriented Software Architecture – Patterns forResource Management
Năm: 2004
[POSA4] F. Buschmann, K. Henney: Pattern-Oriented Software Architecture – On Patterns and Pattern Languages, John Wiley & Sons, to be published in 2005 Sách, tạp chí
Tiêu đề: Pattern-Oriented Software Architecture – On Patterns and Pattern Languages
Tác giả: F. Buschmann, K. Henney
Nhà XB: John Wiley & Sons
Năm: 2005
[Pri04] T. Priebe, E. B. Fernandez, J. I. Mehlau, G. Pernul: A Pattern System for Ac- cess Control, in Proceedings of the 18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sitges, Spain, July 25–28, 2004 Sách, tạp chí
Tiêu đề: A Pattern System for Ac-cess Control", in "Proceedings of the 18th. Annual IFIP WG 11.3 WorkingConference on Data and Applications Security
Năm: 2004

TỪ KHÓA LIÊN QUAN