Security Engineering with Patterns
                                    Markus Schumacher1 and Utz Roedig2
                ...
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Security Engineeringwith Patterns
Upcoming SlideShare
Loading in …5
×

Security Engineeringwith Patterns

773 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
773
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security Engineeringwith Patterns

  1. 1. Security Engineering with Patterns Markus Schumacher1 and Utz Roedig2 Darmstadt University of Technology Department of Computer Science 1 IT Transfer Office (ITO) markus.schumacher@ito.tu-darmstadt.de 2 Industrial Process and System Communications (KOM) utz.roedig@kom.tu-darmstadt.de 27th July 2001 Abstract Conducting digital business requires secure network and application architectures. The recently increasing occurrence of severe attacks has shown, however, that we will still

×