Although many aids such as architectural styles and patterns are now available for software architects, making optimal design decisions on appropriate architectural structures still requires significant creativity. In an effort to introduce a more direct link between an architectural decision and its consequences, a finer grained architectural concept called a tactic has emerged. Since its introduction, many tactics have been identified and used in real- life applications. However, the number of tactics discovered is not sufficient to cover all the necessary aspects of architectural decision making. The tactics could be created from scratch, but it would be more efficient if tactics could be mined from a proven source. One possible source is any architectural pattern that consists of tactics. Therefore, in this paper we propose a novel way to retrieve tactics from well known patterns. Among the many different types of existing patterns, this paper focuses on security patterns.
[1]
Alan M. Davis,et al.
Software Requirements: Objects, Functions and States
,
1993
.
[2]
Ralph E. Johnson,et al.
Organizing Security Patterns
,
2007,
IEEE Software.
[3]
Joseph W. Yoder,et al.
Architectural Patterns for Enabling Application Security
,
1998
.
[4]
Peter Sommerlad,et al.
Security Patterns: Integrating Security and Systems Engineering
,
2006
.
[5]
Eduardo B. Fernandez,et al.
The Authenticator Pattern
,
1999
.
[6]
Paul Clements,et al.
Software architecture in practice
,
1999,
SEI series in software engineering.
[7]
W. Marsden.
I and J
,
2012
.
[8]
Ralph Johnson,et al.
design patterns elements of reusable object oriented software
,
2019
.