Author Archives: ms
The new book on Security Patterns is prepared for print. I’m happy that Ed chose me as shepherd for the book. I’ve just finished the Foreword: “Security is simple. We use a little bit of cryptography, add some firewalls and … Continue reading
Prof. Peter Sommerlad is director of IFS Institute for Software at FHO/HSR Rapperswil, Switzerland. Peter is co-author of the books POSA Vol.1 and Security Patterns and contributed to “97 things every programmer should know”. His goal is to make software … Continue reading
We are aware of the following contributions which focus on security (and somehow related) patterns. In order to reflect the evolution of security patterns they are presented in chronological order (most recent patterns first).
Ed has pioneered the field of Security Patterns. He frequently publishes patterns and books on our beloved topic. Ed’s bio on his Website: “Since 1984 I have been a Professor of Computer Science and Engineering at FAU. Before that, I … Continue reading
The main objective of this Website is to bring together security patterns enthusiasts, to provide a forum for security patterns and to improve the overall work on security patterns. In the past, we have identified security patterns as a very … Continue reading
Nice introduction to Security Patterns: Tutorial T39 @ OOPSLA 2006 by Peter Sommerlad.
Most security books are targeted at security engineers and specialists. Few show how to build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses … Continue reading
A group at SUN (Chris Steel, Ramesh Nagappan, Ray Lai – boys, we miss SUN Microsystems!) offers a set of architectural security patterns for J2EE-based applications, Web services and identity management. They have an outline of their patterns available. See … Continue reading