Using Security Patterns to Model and Analyze Security
Using Security Patterns to Model and Analyze Security Requirements∗ Sascha Konrad, Betty H.C. Cheng†, Laura A. Campbell, and Ronald Wassermann Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing, Michigan 48824, USA Email: {chengb,konradsa,campb222,wasser17}@cse.msu.edu Abstract Recently, there has been growing interest