Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

Security of sharded NoSQL databases: A comparative analysis

A Zahid, R Masood, MA Shibli - 2014 conference on …, 2014 - ieeexplore.ieee.org
NoSQL databases are easy to scale-out because of their flexible schema and support for
BASE (Basically Available, Soft State and Eventually Consistent) properties. The process of …

Securing distributed systems using patterns: A survey

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …

Research Landscape of Patterns in Software Engineering: Taxonomy, State-of-the-Art, and Future Directions

R Mzid, S Selvi, M Abid - SN Computer Science, 2024 - Springer
Software system development is a difficult, error-prone, and time-consuming task. Pattern-
based development has been successfully used to produce high-quality software to address …

Integrated identity and access management metamodel and pattern system for secure enterprise architecture

K Nahar, AQ Gill - Data & Knowledge Engineering, 2022 - Elsevier
Identity and access management (IAM) is one of the key components of the secure
enterprise architecture for protecting the digital assets of the information systems. The …

[PDF][PDF] Organizing security patterns related to security and pattern recognition requirements

M Bunke, R Koschke, K Sohr - International Journal on Advances in …, 2012 - iariajournals.org
Software security is an emerging area in software development. More and more
vulnerabilities are published and highlight the endangerment of systems. Hence, software …

Security solution frames and security patterns for authorization in distributed, collaborative systems

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2015 - Elsevier
The design of an authorization infrastructure is one of the most important aspects of
engineering a secure software system. Unlike other system types, distributed systems–and …

[HTML][HTML] A survey of patterns for web services security and reliability standards

EB Fernandez, O Ajaj, I Buckley, N Delessy-Gassant… - Future Internet, 2012 - mdpi.com
An important aspect for the acceptance of Service-Oriented Architectures is having
convenient ways to help designers build secure applications. Numerous standards define …

Security patterns and a methodology to apply them

EB Fernandez - Security and dependability for ambient intelligence, 2009 - Springer
Patterns encapsulate experience and good practices that can be used for new designs.
Analysis and design patterns are well established as a convenient and reusable way to …

Approaches and Methodologies for Distributed Systems: Threats, Challenges, and Future Directions

Bhawna, V Parihar - Meta Heuristic Algorithms for Advanced …, 2024 - Wiley Online Library
The widespread use of distributed systems has led to a growing concern over their security.
With the increasing number of devices connected to the Internet, the risk of security …