{"title":"Patterns for the secure and reliable execution of processes","authors":"E. Fernández, David laRed Martinez","doi":"10.1145/1753196.1753225","DOIUrl":"https://doi.org/10.1145/1753196.1753225","url":null,"abstract":"The controlled interaction of processes in a computing environment is fundamental for its security and reliability. Processes can be attacked by other processes or by external clients, errors in one process can propagate to others. We show here three patterns that can help provide a secure and reliable execution environment although they need to be complemented with other patterns. They include Protected Entry Points, which control the correct use of entry points according to their signatures (type and length of parameters); and Protection Rings, which control the calls between processes, enforcing constraints on entry points and signatures according to the level of trust in the processes. Finally, the Multilevel Secure Partitions (MSP) pattern, confines execution of a process to a system partition that has a specific confidentiality or integrity level.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The secure blackboard pattern","authors":"J. Ortega-Arjona, E. Fernández","doi":"10.1145/1753196.1753223","DOIUrl":"https://doi.org/10.1145/1753196.1753223","url":null,"abstract":"This paper presents the Secure Blackboard pattern as a secure version of the original Blackboard pattern and Shared Resource pattern. The Blackboard pattern is an architectural pattern useful for problems for which no deterministic solution strategies are known. Several specialized subsystems or components \"assemble\" their knowledge to build a possibly partial or approximate solution, coordinated by a central controller. On the other hand, the Shared Resource pattern is a specialization of the Blackboard pattern, in which subsystems or components are allowed to perform simultaneous computations without a prescribed order on different, ordered data. The Secure Blackboard pattern includes ways to add security at the control component, providing secure handling of data, as well as controlling data transformation and movement.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geert Monsieur, Lotte De Rore, M. Snoeck, Wilfried Lemahieu
{"title":"Handling transactional business services","authors":"Geert Monsieur, Lotte De Rore, M. Snoeck, Wilfried Lemahieu","doi":"10.1145/1753196.1753219","DOIUrl":"https://doi.org/10.1145/1753196.1753219","url":null,"abstract":"This article discusses the handling of transactional business services, which are service compositions that orchestrate and coordinate underlying services to process a high-level business activity. The main contribution made in this article is the presentation of the pattern TBS handler, which describes how one can implement a transactional business service (TBS). This pattern functions as an overview pattern for a complete pattern language that is outlined in the text. This pattern language provides the appropriate ingredients for the implementation of a TBS. It is presented using thumbnails.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Runtime mix'n and match design pattern","authors":"P. Austrem","doi":"10.1145/1753196.1753217","DOIUrl":"https://doi.org/10.1145/1753196.1753217","url":null,"abstract":"Ubiquitous computing is becoming reality, vendors are introducing products that support ubiquitous entertainment and media solutions, businesses are adopting service-oriented architectures, and mobile devices are becoming service consumers. To accomodate this foundational change, software needs to be dynamic and adaptable. This work proposes a pattern for resolving the need for dynamic actors by introducing the concepts of Intents, IntentHandlers, IntentFilters and IntentResponders. These four concepts express an abstraction allowing for late dynamic runtime binding to solve functional exigencies. Client software is no longer bound to specific programs, functions or services to solve functional needs; instead they can dynamically bind to IntentResponders to solve their functional exigencies. The pattern may incur a slight performance overhead, but allows for an extendable and dynamic solution.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web security patterns for analysis and design","authors":"T. Okubo, Hidehiko Tanaka","doi":"10.1145/1753196.1753226","DOIUrl":"https://doi.org/10.1145/1753196.1753226","url":null,"abstract":"Although security requirements analysis plays a very significant role in secure software development, it is difficult since it requires much security expertise and man-power. Plain and practical security requirements patterns are needed. We have presented a visualized analysis approach for eliciting security requirements by extending misuse cases, and found that some of its results can be pattern candidates. This paper proposes 8 new web security requirements patterns with our analysis approach. The proposed patterns give analysts a way to find a proper pattern for a specific security goal. They are related to security solutions, and also produce some security design possibilities. We have applied these patterns to some case studies and evaluated that they are effective for web security analysis.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127361506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise architecture management patterns","authors":"Alexander M. Ernst","doi":"10.1145/1753196.1753205","DOIUrl":"https://doi.org/10.1145/1753196.1753205","url":null,"abstract":"This article introduces the concept of enterprise architecture management (EAM) patterns, a pattern based approach for EA management. Three different types of patterns are presented. M-Patterns document proven-practice methodologies to address typical problems in EA management. V-Patterns represent best-practice visualizations, whereas I-Patterns indicate information requirements for EA management. These patterns build up a pattern language for EA management, with an excerpt given in this article.","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 15th Conference on Pattern Languages of Programs","authors":"J. Yoder, Ademar Aguiar","doi":"10.1145/1753196","DOIUrl":"https://doi.org/10.1145/1753196","url":null,"abstract":"Welcome to PLoP '08, the 15th Conference on Pattern Languages of Programs, a premier event for pattern authors and pattern enthusiasts to gather, discuss and learn more about patterns, pattern writing, pattern reviewing, shepherding, software development, collaboration, and more, much more. \u0000 \u0000To accomplish this, the conference program offers a rich set of activities that altogether promote a friendly and effective environment to share expertise, and to give and get feedback from fellow authors. \u0000 \u0000The pre-conference activities started Friday morning at the BootCamp, a special session aimed at people new to patterns and/or PLoP, led by Linda Rising and Robert Hanmer. \u0000 \u0000Writers' Workshops are the primary focus of our time at PLoP and it will be during them that we will discuss and review each other's papers in a very fruitful way. We have four groups of six papers each, which were selected from an initial set of around 40 submissions, and after a considerable period of shepherding. Papers of the Writing Group will have in addition the opportunity of being evolved during PLoP with the mentoring of very experienced pattern writers. We are excited to have two Invited Talks which will be time to get inspired and energized by the words and thoughts of Joshua Kerievsky, and Rebecca Wirfs-Brock on hot topics related with design and learning. But there is more. Other activities, such as the 'Birds of a Feather' (BoF), or the Monday's Workshops/Focus Groups let you informally organize your own session about topics you are interested in, or to attend already organized working sessions. Just announce them or subscribe to them!","PeriodicalId":332993,"journal":{"name":"Proceedings of the 15th Conference on Pattern Languages of Programs","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127785923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}