Next Article in Journal
FSCR: A Deep Social Recommendation Model for Misleading Information
Next Article in Special Issue
Malware Detection Based on Code Visualization and Two-Level Classification
Previous Article in Journal
Examining the Effects of Media-Generated Stereotypes on Receivers’ Trust and Attitude in Pakistan. Moderating Influence of Ethnicity and Gender
Previous Article in Special Issue
The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
Article

Systematic Literature Review of Security Pattern Research

1
Department of Computer Science and Engineering, Waseda University, Shinjuku-ku, Tokyo 169-8555, Japan
2
Hitachi, Ltd., Chiyoda-ku, Tokyo 100-8280, Japan
3
Institute of Information Security, Yokohama, Kanagawa 221-0835, Japan
4
Institute of Engineering, Academic Assembly, Shinshu University, Nagano City, Nagano 380-8553, Japan
5
Department of Information Sciences, Kanagawa University, Hiratsuka 259-1293, Japan
6
Department of Information Science, Tokyo Gakugei University, Koganei-shi, Tokyo 184-8501, Japan
7
Department of Software Science, Tamagawa University, Tokyo 194-8610, Japan
8
National Institute of Informatics, Chiyoda-ku, Tokyo 101-8430, Japan
9
PSG College of Technology, Tamil Nadu 641004, India
*
Author to whom correspondence should be addressed.
Information 2021, 12(1), 36; https://doi.org/10.3390/info12010036
Received: 14 November 2020 / Revised: 7 January 2021 / Accepted: 10 January 2021 / Published: 16 January 2021
(This article belongs to the Special Issue Cyberspace Security, Privacy & Forensics)
Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns. View Full-Text
Keywords: security patterns; software patterns; systematic literature review (SLR) security patterns; software patterns; systematic literature review (SLR)
Show Figures

Figure 1

MDPI and ACS Style

Washizaki, H.; Xia, T.; Kamata, N.; Fukazawa, Y.; Kanuka, H.; Kato, T.; Yoshino, M.; Okubo, T.; Ogata, S.; Kaiya, H.; Hazeyama, A.; Tanaka, T.; Yoshioka, N.; Priyalakshmi, G. Systematic Literature Review of Security Pattern Research. Information 2021, 12, 36. https://doi.org/10.3390/info12010036

AMA Style

Washizaki H, Xia T, Kamata N, Fukazawa Y, Kanuka H, Kato T, Yoshino M, Okubo T, Ogata S, Kaiya H, Hazeyama A, Tanaka T, Yoshioka N, Priyalakshmi G. Systematic Literature Review of Security Pattern Research. Information. 2021; 12(1):36. https://doi.org/10.3390/info12010036

Chicago/Turabian Style

Washizaki, Hironori, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, and G. Priyalakshmi. 2021. "Systematic Literature Review of Security Pattern Research" Information 12, no. 1: 36. https://doi.org/10.3390/info12010036

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop