Pattern Catalog

Pattern Catalog

I am attempting to pull together a catalog of patterns from a number of sources and applicable to a number of different personas. For anyone interested in learning more about patterns see http://social.technet.microsoft.com/wiki/contents/articles/an-introduction-to-patterns.aspx

Security Patterns

Authentication Patterns

  • Direct Authentication
  • Brokered Authentication

 

Message Protection Patterns

  • Data Origin Authentication (Data Integrity)
  • Data Confidentiality
  • Message Validator

 

 Resource Access Patterns

  • Trusted Subsystem
  • Protocol Transition
  • Constrained Delegation

 

Service Boundary Patterns

  • Message Replay Detection
  • Message Validator
  • Exception Shielding

 

Service Deployment Patterns

  • Perimeter Service Router

 

 

 

Leave a Comment
  • Please add 7 and 8 and type the answer here:
  • Post
Wiki - Revision Comment List(Revision Comment)
Sort by: Published Date | Most Recent | Most Useful
Comments
  • Maheshkumar S Tiwari edited Revision 3. Comment: corrected typo error and added tag

Page 1 of 1 (1 items)
Wikis - Comment List
Sort by: Published Date | Most Recent | Most Useful
Posting comments is temporarily disabled until 10:00am PST on Saturday, December 14th. Thank you for your patience.
Comments
  • Maheshkumar S Tiwari edited Revision 3. Comment: corrected typo error and added tag

Page 1 of 1 (1 items)