information regarding the way several key actors in 
the software development process view and judge 
those requirements.  
4 CONCLUSION  
This paper introduces some elements in 
improvement of representation security components 
with integration of software components by using 
security patterns and creating the security patterns 
repository. It was shown that this approach may be 
used to development of expert systems in security 
domain.  
It was shown the improved security ontology 
with taking into account the elements of fuzzy 
expert system. 
The security patterns repository and security 
patterns approach provides opportunity to software 
engineers, who are not security experts, to make the 
appropriate choices regarding security mechanisms 
and solutions, thus facilitating the development of 
secure applications. As a next step, this repository 
will be employed in the development of a security 
domain application, such as development of expert 
systems for information security active audit. 
REFERENCES 
Akerman, A. and Tyree, J.  2006. Using ontology to 
support development of software architectures.  IBM 
Sys. Journal, vol. 45, N0 4, pp. 813-825. 
Atymtayeva L., Kozhakhmet K., Bortsova G., Inoue A. 
2012. Expert System for Security Audit Using Fuzzy 
Logic. Proc of MAICS, April 21-22, 2012, Cincinnati, 
USA, рр. 146-151 
Atymtayeva L., K. Kozhakhmet,  G. Bortsova,  2014, 
Building a Knowledge Base for Expert System in 
Information Security. Soft Computing in Artificial 
Intelligence Advances in Intelligent Systems and 
Computing Volume 270,  pp 57-76 
Balopoulos Th. , et.al., 2006. A Framework for Exploiting 
Security Expertise in Application Development. In 
Lecture Notes in Computer Science, Volume 4083, pp 
62-70 
Basin, D.A., Doser, J., and Lodderstedt, T. 2006.  Model 
driven security: From UML models to access control 
infrastructures. ACM Trans. on Software Engineering 
and Methodology, vol. 15, No 1,pp. 39-49 
Biham, E. Boyer M., Boykin P. O., Mor T., and 
Roychowdhury V. 2000. A Proof of the Security of 
Quantum Key Distribution. Procs of the 32’nd Ann. 
ACM Symposium STOC’00, ACM Press, pp. 715-724. 
Braz, F., Fernandez, E.B.,and VanHilst, M. 2008. Eliciting 
security requirements through misuse activities. Procs. 
of the 2nd Int. Workshop SPattern'07, Turin, Italy, 
September 1-5, 2008, pp.328-333. 
Buschmann, F., et al. 1996.  Pattern- oriented software 
architecture, Wiley. 
Dritsas,S., Gymnopoulos, L., Karyda, M., Balopoulos, T., 
Kokolakis, S., Lambridounakis, C., and Gritzalis, S. 
2005. Employing ontologies for the development of 
security critical applications. Procs, of the IFIP I3E 
Conf., Oct. 2005, pp.187-201. 
Fenz S. and Ekelhart A. 2009. Formalizing information 
security knowledge, ASIACCS ’09, ACM. 
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., and 
VanHilst, M., 2006. A methodology to develop secure 
systems using patterns, Chapter 5 in "Integrating 
security and software engineering: Advances and 
future vision", H. Mouratidis and P. Giorgini (Eds.), 
IDEA Press, pp. 107-126. 
Fernandez, E.B. and X.Yuan. 2010. Semantic analysis 
patterns and secure semantic analysis patterns", in 
revision for the IJICS,  Inderscience Publishers. 
Gamma E., 2001. Design patterns ten years later. In Broy, 
M., Denert, E., eds.: Software Pioneers: Contributions 
to Software Engineering, Springer-Verlag. pp. 689–
699. 
Lazaros Gymnopoulos1, et.al., 2006 Developing a 
Security Patterns Repository for Secure Applications 
Design  
Lipner, S. and Howard, M. 2005. The Trustworthy 
Computing Security Development Lifecycle, MSDN 
Library  
Maljuk A.A. 2010. Information Security: Contemporary 
Issues, Security Information technology; № 1, pp.5-9. 
Mouratidis H., and Giorgini, P. 2004 Analysing security in 
information systems. Procs. of the 2nd Int. Workshop 
ICEIS 2004, Porto, Portugal. 
Nagaratnam, N., Nadalin, A., Hondo, M., McIntosh, M., 
and Austel, P. 2005. Business-driven application 
security: from modeling to managing secure 
applications.  IBM Systems Journal, vol. 44, No 4, 
pp.847-867 
Protsenko N., Atymtayeva L., Kozhakhmet K. 2012. 
Using FRIL in Development of Expert System 
Applications, Proc. ICITM 2012, Riga, Latvia, p. 98. 
Shor P. W. 1994 Algorithms for quantum computation: 
Discrete logarithms and factoring. In Procs of the 
35nd Annual Symposium on FCS IEEE CSP.  pp. 124–
134. 
Schumacher M., Fernandez E.B., et.al., 2006. Security 
Patterns: Integrating Security And Systems 
Engineering, John Wiley&Sons Inc. 
Taylor, R.N., Medvidovic, N., and Dashofy, N. 2010. 
Software architecture: Foundation, theory, and 
practice, Wiley. 
Voroviev, A. and Bekmamedova, N. 2010. An ontology-
driven approach applied to information security.  J. of  
Research and Practice in Information Tech., vol. 42, 
No 1, pp.61-76. 
 
Fifth International Symposium on Business Modeling and Software Design
204