Skip to main content

Initiating a Pattern Language for Context-Patterns

  • Chapter
  • First Online:
Pattern and Security Requirements
  • 1338 Accesses

Abstract

A context-pattern describes common elements, structures, and stakeholders for a specific domain such as cloud computing. These commonalities for a context were obtained from observations about the domain from sources such as standards, domain specific-publications, domain experts, and guidelines. Existing context-patterns can be used for a structured elicitation and analysis of domain knowledge by instantiating the respective context-pattern. In the previous chapter, we showed a catalog of context-patterns. In this chapter, we aim at broadening the context-pattern approach by initiating a pattern language for context-patterns, which will be continuously improved. The aim of this language is to gain an understanding of common elements in context-patterns and support engineers in applying this knowledge for describing their own context-patterns. For this purpose, we analyzed the common concepts in our context-patterns and created a meta-model to show the common elements and their relations. Moreover, we defined a pattern language syntax for context-patterns based on the insights we gathered from analyzing possible relations and relation types between context-patterns. Furthermore, we compared our pattern language with different existing pattern languages. For this comparison, we contribute a structured template for describing pattern languages and instantiate the template for well-known pattern languages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The definition of the term language in the Oxford English Dictionary: http://www.oed.com.

  2. 2.

    The term vocabulary defined in the Oxford dictionaries http://www.oxforddictionaries.com/definition/english/vocabulary?q=vocabulary.

  3. 3.

    The definition of the term semantic in the Oxford dictionaries http://www.oxforddictionaries.com/definition/english/semantic.

  4. 4.

    ACM citation count of analysis patterns: reusable objects models source: http://dl.acm.org/citation.cfm?id=265172.

  5. 5.

    ACM citation count of Design patterns: Elements of reusable object-oriented software source: http://dl.acm.org/citation.cfm?id=186897.

  6. 6.

    ACM citation count of Pattern-oriented software architecture: A system of patterns source: http://dl.acm.org/citation.cfm?id=249013.

  7. 7.

    Connection and relationship are synonyms according to dictonary.com: http://dictionary.reference.com/browse/relationship.

References

  • Alexander, C. (1977). A pattern language: Towns, buildings, construction. Oxford University Press.

    Google Scholar 

  • Beckers, K., & Faßbender, S. (2012). Peer-to-peer driven software engineering considering security, reliability, and performance. In Proceedings of the International Conference on Availability, Reliability And Security (ARES)—2nd International Workshop on Resilience and It-Risk in Social Infrastructures (RISI 2012) (pp. 485–494). IEEE Computer Society.

    Google Scholar 

  • Beckers, K., Faßbender, S., & Heisel, M. (2013). A meta-model approach to the fundamentals for a pattern language for context elicitation. In Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop).

    Google Scholar 

  • Beckers, K., Faßbender, S., & Heisel, M. (2014a). Deriving a pattern language syntax for context-patterns. In Proceedings of the 19th European Conference on Pattern Languages of Programs (Europlop).

    Google Scholar 

  • Beckers, K., Faßbender, S., & Heisel, M. (2014b). A meta-pattern and pattern form for context-patterns. In Proceedings of the 19th European Conference on Pattern Languages of Programs (Europlop).

    Google Scholar 

  • Beckers, K., Faßbender, S., Heisel, M., & Meis, R. (2012a). Pattern-based context establishment for service-oriented architectures. In Software service and application engineering (pp. 81–101). Springer.

    Google Scholar 

  • Beckers, K., Faßbender, S., Küster, J.-C., & Schmidt, H. (2012b). A pattern-based method for identifying and analyzing laws. In Proceedings of the International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ) (pp. 256–262). Springer.

    Google Scholar 

  • Beckers, K., Faßbender, S., & Schmidt, H. (2012c). An integrated method for pattern-based elicitation of legal requirements applied to a cloud computing example. In Proceedings of the International Conference on Availability, Reliability and Security (ARES)—2nd International Workshop on Resilience and It-Risk in Social Infrastructures (RISI 2012) (pp. 463–472). IEEE Computer Society.

    Google Scholar 

  • Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-oriented software architecture volume 1: A system of patterns. New York: Wiley.

    Google Scholar 

  • Buschmann, F., Henney, K., & Schmidt, D. C. (2007). Pattern-oriented software architecture volume 5: On patterns and pattern languages. New York: Wiley.

    Google Scholar 

  • Eloranta, V.-P., Koskinen, J., Leppänen, M., & Reijonen, V. (2014). Designing distributed control systems: A pattern language approach. New York: Wiley.

    Google Scholar 

  • Fernandez, E. B. (2013). Security patterns in practice: Designing secure architectures using software patterns. Boston: Addison-Wesley.

    Google Scholar 

  • Fernandez, E. B., & Pan, R. (2001). A Pattern Language for Security Models. In 8th conference of pattern languages of programs (plop).

    Google Scholar 

  • Fowler, M. (1996). Analysis patterns: Reusable object models. Reading: Addison-Wesley.

    Google Scholar 

  • Fowler, M. (2002). Patterns of enterprise application architecture. Boston: Addison-Wesley.

    Google Scholar 

  • Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Reading: Addison-Wesley.

    Google Scholar 

  • Hafiz, M., Adamczyk, P., & Johnson, R. E. (2012). Growing a pattern language (for security). In Proceedings of the ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (pp. 139–158). ACM.

    Google Scholar 

  • ISO/IEC. (2005). Information technology—Security techniques—Information security management systems–Requirements (ISO/IEC 27001). Geneva, Switzerland: International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC).

    Google Scholar 

  • Jackson, M. (2001). Problem Frames. Analyzing and structuring software development problems. Reading: Addison-Wesley.

    Google Scholar 

  • Noble, J. (1998). Classifying relationships between object-oriented design patterns. In Proceedings of the Australian Software Engineering Conference (pp. 98–107). IEEE Computer Society.

    Google Scholar 

  • Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security patterns: Integrating security and systems engineering. New York: Wiley.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristian Beckers .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Beckers, K. (2015). Initiating a Pattern Language for Context-Patterns. In: Pattern and Security Requirements. Springer, Cham. https://doi.org/10.1007/978-3-319-16664-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16664-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16663-6

  • Online ISBN: 978-3-319-16664-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics