Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns
Organizational patterns can be applied to correct problems or build a new organization from scratch. Security patterns can help organizations develop secure software. Security in organization can be established using sequences of organizational and security patterns. Security patterns can help organ...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10891805/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849724360417345536 |
|---|---|
| author | Viktor Matovic Valentino Vranic |
| author_facet | Viktor Matovic Valentino Vranic |
| author_sort | Viktor Matovic |
| collection | DOAJ |
| description | Organizational patterns can be applied to correct problems or build a new organization from scratch. Security patterns can help organizations develop secure software. Security in organization can be established using sequences of organizational and security patterns. Security patterns can help organizations develop secure software. Although isolated applications of one or more security patterns are typical in practice, an effective response to security threats requires the utilization of an entire pattern catalog. Composing software patterns in a particular sequence order makes them more efficient. Solutions for establishing sequences of security and organizational patterns are often documented in plain text using explicit pattern relationships. Identifying the most probably used security and organizational patterns from their text descriptions allows us to establish meaningful sequences from these patterns. In this work, we show how we established 14 sequences of security patterns using the strongest symmetries of the relationships. We calculated the strongest symmetries of relationships between patterns identified in the Bayesian belief network as conditionally dependent patterns. We calculated the strongest symmetries of relationships using conditional probabilities of security pattern use with the stochastic tree built on deliberately chosen sequences of security patterns. Sequences of security patterns established in this way can be used after meaningful sequences of organizational patterns to implement security in the working organization. The applicability of belief networks and stochastic trees is not limited to security or organizational patterns. We consider applying them to patterns engineering software for cloud. |
| format | Article |
| id | doaj-art-a2cc1036c3d0474c8d6f225c15eb0e53 |
| institution | DOAJ |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-a2cc1036c3d0474c8d6f225c15eb0e532025-08-20T03:10:46ZengIEEEIEEE Access2169-35362025-01-0113324433245710.1109/ACCESS.2025.354331910891805Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security PatternsViktor Matovic0https://orcid.org/0000-0002-8083-232XValentino Vranic1https://orcid.org/0000-0001-9044-4593Faculty of Informatics and Information Technologies, Institute of Informatics, Information Systems, and Software Engineering, Slovak University of Technology in Bratislava, Bratislava, SlovakiaFaculty of Informatics, Pan-European University, Bratislava, SlovakiaOrganizational patterns can be applied to correct problems or build a new organization from scratch. Security patterns can help organizations develop secure software. Security in organization can be established using sequences of organizational and security patterns. Security patterns can help organizations develop secure software. Although isolated applications of one or more security patterns are typical in practice, an effective response to security threats requires the utilization of an entire pattern catalog. Composing software patterns in a particular sequence order makes them more efficient. Solutions for establishing sequences of security and organizational patterns are often documented in plain text using explicit pattern relationships. Identifying the most probably used security and organizational patterns from their text descriptions allows us to establish meaningful sequences from these patterns. In this work, we show how we established 14 sequences of security patterns using the strongest symmetries of the relationships. We calculated the strongest symmetries of relationships between patterns identified in the Bayesian belief network as conditionally dependent patterns. We calculated the strongest symmetries of relationships using conditional probabilities of security pattern use with the stochastic tree built on deliberately chosen sequences of security patterns. Sequences of security patterns established in this way can be used after meaningful sequences of organizational patterns to implement security in the working organization. The applicability of belief networks and stochastic trees is not limited to security or organizational patterns. We consider applying them to patterns engineering software for cloud.https://ieeexplore.ieee.org/document/10891805/Security patternsorganizational patternsimplicit pattern relationshipspattern sequences |
| spellingShingle | Viktor Matovic Valentino Vranic Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns IEEE Access Security patterns organizational patterns implicit pattern relationships pattern sequences |
| title | Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns |
| title_full | Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns |
| title_fullStr | Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns |
| title_full_unstemmed | Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns |
| title_short | Establishing Pattern Sequences Using Stochastic Trees and Bayesian Belief Networks With an Application to Security Patterns |
| title_sort | establishing pattern sequences using stochastic trees and bayesian belief networks with an application to security patterns |
| topic | Security patterns organizational patterns implicit pattern relationships pattern sequences |
| url | https://ieeexplore.ieee.org/document/10891805/ |
| work_keys_str_mv | AT viktormatovic establishingpatternsequencesusingstochastictreesandbayesianbeliefnetworkswithanapplicationtosecuritypatterns AT valentinovranic establishingpatternsequencesusingstochastictreesandbayesianbeliefnetworkswithanapplicationtosecuritypatterns |