Proceedings of the 15th Conference on Pattern Languages of Programs最新文献

筛选
英文 中文
Patterns for the secure and reliable execution of processes 用于安全可靠地执行流程的模式
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2008-10-18 DOI: 10.1145/1753196.1753225
E. Fernández, David laRed Martinez
{"title":"Patterns for the secure and reliable execution of processes","authors":"E. Fernández, David laRed Martinez","doi":"10.1145/1753196.1753225","DOIUrl":"https://doi.org/10.1145/1753196.1753225","url":null,"abstract":"The controlled interaction of processes in a computing environment is fundamental for its security and reliability. Processes can be attacked by other processes or by external clients, errors in one process can propagate to others. We show here three patterns that can help provide a secure and reliable execution environment although they need to be complemented with other patterns. They include Protected Entry Points, which control the correct use of entry points according to their signatures (type and length of parameters); and Protection Rings, which control the calls between processes, enforcing constraints on entry points and signatures according to the level of trust in the processes. Finally, the Multilevel Secure Partitions (MSP) pattern, confines execution of a process to a system partition that has a specific confidentiality or integrity level.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The secure blackboard pattern 安全的黑板图案
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2008-10-18 DOI: 10.1145/1753196.1753223
J. Ortega-Arjona, E. Fernández
{"title":"The secure blackboard pattern","authors":"J. Ortega-Arjona, E. Fernández","doi":"10.1145/1753196.1753223","DOIUrl":"https://doi.org/10.1145/1753196.1753223","url":null,"abstract":"This paper presents the Secure Blackboard pattern as a secure version of the original Blackboard pattern and Shared Resource pattern. The Blackboard pattern is an architectural pattern useful for problems for which no deterministic solution strategies are known. Several specialized subsystems or components \"assemble\" their knowledge to build a possibly partial or approximate solution, coordinated by a central controller. On the other hand, the Shared Resource pattern is a specialization of the Blackboard pattern, in which subsystems or components are allowed to perform simultaneous computations without a prescribed order on different, ordered data. The Secure Blackboard pattern includes ways to add security at the control component, providing secure handling of data, as well as controlling data transformation and movement.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Handling transactional business services 处理事务性业务服务
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2008-10-18 DOI: 10.1145/1753196.1753219
Geert Monsieur, Lotte De Rore, M. Snoeck, Wilfried Lemahieu
{"title":"Handling transactional business services","authors":"Geert Monsieur, Lotte De Rore, M. Snoeck, Wilfried Lemahieu","doi":"10.1145/1753196.1753219","DOIUrl":"https://doi.org/10.1145/1753196.1753219","url":null,"abstract":"This article discusses the handling of transactional business services, which are service compositions that orchestrate and coordinate underlying services to process a high-level business activity. The main contribution made in this article is the presentation of the pattern TBS handler, which describes how one can implement a transactional business service (TBS). This pattern functions as an overview pattern for a complete pattern language that is outlined in the text. This pattern language provides the appropriate ingredients for the implementation of a TBS. It is presented using thumbnails.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime mix'n and match design pattern 运行时混合和匹配设计模式
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2008-10-18 DOI: 10.1145/1753196.1753217
P. Austrem
{"title":"Runtime mix'n and match design pattern","authors":"P. Austrem","doi":"10.1145/1753196.1753217","DOIUrl":"https://doi.org/10.1145/1753196.1753217","url":null,"abstract":"Ubiquitous computing is becoming reality, vendors are introducing products that support ubiquitous entertainment and media solutions, businesses are adopting service-oriented architectures, and mobile devices are becoming service consumers. To accomodate this foundational change, software needs to be dynamic and adaptable. This work proposes a pattern for resolving the need for dynamic actors by introducing the concepts of Intents, IntentHandlers, IntentFilters and IntentResponders. These four concepts express an abstraction allowing for late dynamic runtime binding to solve functional exigencies. Client software is no longer bound to specific programs, functions or services to solve functional needs; instead they can dynamically bind to IntentResponders to solve their functional exigencies. The pattern may incur a slight performance overhead, but allows for an extendable and dynamic solution.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Web security patterns for analysis and design 用于分析和设计Web安全模式
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2008-10-18 DOI: 10.1145/1753196.1753226
T. Okubo, Hidehiko Tanaka
{"title":"Web security patterns for analysis and design","authors":"T. Okubo, Hidehiko Tanaka","doi":"10.1145/1753196.1753226","DOIUrl":"https://doi.org/10.1145/1753196.1753226","url":null,"abstract":"Although security requirements analysis plays a very significant role in secure software development, it is difficult since it requires much security expertise and man-power. Plain and practical security requirements patterns are needed. We have presented a visualized analysis approach for eliciting security requirements by extending misuse cases, and found that some of its results can be pattern candidates. This paper proposes 8 new web security requirements patterns with our analysis approach. The proposed patterns give analysts a way to find a proper pattern for a specific security goal. They are related to security solutions, and also produce some security design possibilities. We have applied these patterns to some case studies and evaluated that they are effective for web security analysis.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127361506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Enterprise architecture management patterns 企业架构管理模式
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2008-10-18 DOI: 10.1145/1753196.1753205
Alexander M. Ernst
{"title":"Enterprise architecture management patterns","authors":"Alexander M. Ernst","doi":"10.1145/1753196.1753205","DOIUrl":"https://doi.org/10.1145/1753196.1753205","url":null,"abstract":"This article introduces the concept of enterprise architecture management (EAM) patterns, a pattern based approach for EA management. Three different types of patterns are presented. M-Patterns document proven-practice methodologies to address typical problems in EA management. V-Patterns represent best-practice visualizations, whereas I-Patterns indicate information requirements for EA management. These patterns build up a pattern language for EA management, with an excerpt given in this article.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Proceedings of the 15th Conference on Pattern Languages of Programs 第十五届程序模式语言会议论文集
Proceedings of the 15th Conference on Pattern Languages of Programs Pub Date : 2006-10-21 DOI: 10.1145/1753196
J. Yoder, Ademar Aguiar
{"title":"Proceedings of the 15th Conference on Pattern Languages of Programs","authors":"J. Yoder, Ademar Aguiar","doi":"10.1145/1753196","DOIUrl":"https://doi.org/10.1145/1753196","url":null,"abstract":"Welcome to PLoP '08, the 15th Conference on Pattern Languages of Programs, a premier event for pattern authors and pattern enthusiasts to gather, discuss and learn more about patterns, pattern writing, pattern reviewing, shepherding, software development, collaboration, and more, much more. \u0000 \u0000To accomplish this, the conference program offers a rich set of activities that altogether promote a friendly and effective environment to share expertise, and to give and get feedback from fellow authors. \u0000 \u0000The pre-conference activities started Friday morning at the BootCamp, a special session aimed at people new to patterns and/or PLoP, led by Linda Rising and Robert Hanmer. \u0000 \u0000Writers' Workshops are the primary focus of our time at PLoP and it will be during them that we will discuss and review each other's papers in a very fruitful way. We have four groups of six papers each, which were selected from an initial set of around 40 submissions, and after a considerable period of shepherding. Papers of the Writing Group will have in addition the opportunity of being evolved during PLoP with the mentoring of very experienced pattern writers. We are excited to have two Invited Talks which will be time to get inspired and energized by the words and thoughts of Joshua Kerievsky, and Rebecca Wirfs-Brock on hot topics related with design and learning. But there is more. Other activities, such as the 'Birds of a Feather' (BoF), or the Monday's Workshops/Focus Groups let you informally organize your own session about topics you are interested in, or to attend already organized working sessions. Just announce them or subscribe to them!","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127785923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信