Analysis of web based structural security patterns by employing ten security principles

Riaz, Rabia and Rizvi, Sanam Shehla and Riaz, Farina ORCID: and Hameed, Nausheen and Shokat, Sana (2017) Analysis of web based structural security patterns by employing ten security principles. International Journal of Computer Science and Network Security, 17 (10). pp. 45-56. ISSN 1738-7906


Security is an important and reminisce issue of any software. To ignore security matters or leaving them till later stages of software development could be dangerous as it is difficult to retrofit security in an application later on. In the security critical applications, it is extremely important to avoid mistakes. Therefore, the use of security patterns is important for developing a secure system. In this paper we present how security can boost up by using ten security principles. We conducted a literature review in the field of security patterns, identified problems and proposed a pattern for user authentication function in mobile devices and carried out a comparison based research. We are using ten security design principles as matrices comparing with structure patterns. We summarize which patterns fulfill which of these ten security principles. We get these security patterns from security patterns repository.

Statistics for USQ ePrint 44021
Statistics for this ePrint Item
Item Type: Article (Commonwealth Reporting Category C)
Refereed: Yes
Item Status: Live Archive
Additional Information: Permanent restricted access to published version in accordance with the copyright policy of the publisher.
Faculty/School / Institute/Centre: No Faculty
Faculty/School / Institute/Centre: No Faculty
Date Deposited: 29 Oct 2021 05:44
Last Modified: 03 Nov 2021 06:47
Uncontrolled Keywords: web applications; security design patterns; security principles; mobile devices; user authentication
Fields of Research (2008): 08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
Fields of Research (2020): 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460402 Data and information privacy

Actions (login required)

View Item Archive Repository Staff Only