http://dbpedia.org/ontology/abstract
|
Security patterns can be applied to achiev … Security patterns can be applied to achieve goals in the area of security. All of the classical design patterns have different instantiations to fulfill some information security goal: such as confidentiality, integrity, and availability. Additionally, one can create a new design pattern to specifically achieve some security goal.o specifically achieve some security goal.
|
http://dbpedia.org/ontology/wikiPageExternalLink
|
https://web.archive.org/web/20130328020348/http:/pnp.azurewebsites.net/en-us/ +
, http://www.nii.ac.jp/pi/n5/5_35.pdf +
, http://www.opengroup.org/publications/catalog/g031.htm +
, http://coresecuritypatterns.com/patterns.htm +
|
http://dbpedia.org/ontology/wikiPageID
|
15282212
|
http://dbpedia.org/ontology/wikiPageLength
|
6680
|
http://dbpedia.org/ontology/wikiPageRevisionID
|
952064080
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/Information_security +
, http://dbpedia.org/resource/Category:Security_engineering +
, http://dbpedia.org/resource/Pattern_Languages_of_Programs +
, http://dbpedia.org/resource/The_Open_Group +
, http://dbpedia.org/resource/Sun_Microsystems +
, http://dbpedia.org/resource/Pluggable_Authentication_Modules +
, http://dbpedia.org/resource/Replication_%28computer_science%29 +
|
http://dbpedia.org/property/wikiPageUsesTemplate
|
http://dbpedia.org/resource/Template:Reflist +
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:Security_engineering +
|
http://www.w3.org/ns/prov#wasDerivedFrom
|
http://en.wikipedia.org/wiki/Security_pattern?oldid=952064080&ns=0 +
|
http://xmlns.com/foaf/0.1/isPrimaryTopicOf
|
http://en.wikipedia.org/wiki/Security_pattern +
|
owl:sameAs |
https://global.dbpedia.org/id/4ubr2 +
, http://dbpedia.org/resource/Security_pattern +
, http://www.wikidata.org/entity/Q7444981 +
|
rdfs:comment |
Security patterns can be applied to achiev … Security patterns can be applied to achieve goals in the area of security. All of the classical design patterns have different instantiations to fulfill some information security goal: such as confidentiality, integrity, and availability. Additionally, one can create a new design pattern to specifically achieve some security goal.o specifically achieve some security goal.
|
rdfs:label |
Security pattern
|