Unifying Design Patterns with Security and Attack Patterns
Blackwell, Clive, Zhu, Hong (Eds.)
2014, XI, 264 p. 48 illus.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Includes extended and updated papers from the First International Workshop on Cyberpatterns
Provides a broad introduction to this novel and fast-moving field
Contains both a research agenda and practical applications for cyberpatterns
Cyberpatterns are predictable regularities in cyberspace helping us to design and implement more effective and secure systems, and to detect and respond to breaches, failures and deficiencies in operational systems.
Cyberpatterns is in its infancy and there are many challenges including:
Developing a scientific foundation of pattern-oriented research methods
Developing better engineering practice in novel application domains such as for cloud and cyberphysical systems
Constructing a sharable knowledge-base to aid education of students, design of novel systems and the development of automated design tools
Innovative applications of design patterns to pattern recognition and big data
Presents the state-of-the-art in the novel field of cyberpatterns
Demonstrates the application of patterns to cyber security and other key cyberspace domains
Supports the development of a sound scientific, engineering and mathematical foundation for cyberspace
This important new book provides an introduction to and coverage of the state-of-the-art of cyberpatterns, from a theoretical standpoint and via practical applications, bringing together different interdisciplinary areas under one roof to portray a holistic view of the underlying principles and mechanisms of cyberpatterns.
Clive Blackwell is an Associate Lecturer at Oxford Brookes University specialising in cyber security and digital forensics
Hong Zhu is a Professor at Oxford Brookes University where he is Head of the Applied Formal Methods Research Group. He has a longstanding interest in design patterns and is the author of ‘Software design methodology: from principles to architectural styles’
Content Level »Research
Keywords »Aspect Oriented Programming - Attack and Defense Patterns - Complex Event Processing - Composition Patterns of Hacking - Cyber Situational Awareness - Design Patterns - Design Space - Enterprise Security Systems - Formal Methods - Memory Corruption - Network Resilience and Multi-level Resilience - Network Security - Pattern Representation - Policy Configuration - Secure Component Composition / Secure Service Composition - Software and Security Patterns