Evaluating the degree of security of a system built using security patterns
ARES, pp. 43:1-43:8, 2018.
A variety of methodologies to build secure systems have been proposed. However, most of them do not say much about how to evaluate the degree of security of their products. In fact, we have no generally-accepted ways to measure if the product of some methodology has reached some degree of security. However, if the system has been built wi...More
Full Text (Upload PDF)
PPT (Upload PPT)