Security Engineeringwith Patterns

715 views
658 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
715
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security Engineeringwith Patterns

  1. 1. Security Engineering with Patterns Markus Schumacher1 and Utz Roedig2 Darmstadt University of Technology Department of Computer Science 1 IT Transfer Office (ITO) markus.schumacher@ito.tu-darmstadt.de 2 Industrial Process and System Communications (KOM) utz.roedig@kom.tu-darmstadt.de 27th July 2001 Abstract Conducting digital business requires secure network and application architectures. The recently increasing occurrence of severe attacks has shown, however, that we will still

×