{"id":712,"date":"2020-12-09T09:53:49","date_gmt":"2020-12-09T09:53:49","guid":{"rendered":"https:\/\/www.semiotics-project.eu\/?page_id=712"},"modified":"2021-02-22T15:25:10","modified_gmt":"2021-02-22T15:25:10","slug":"pattern-repository","status":"publish","type":"page","link":"https:\/\/www.semiotics-project.eu\/?page_id=712","title":{"rendered":"Pattern Repository"},"content":{"rendered":"\n<p>SEMIoTICS developed a number of Security, Privacy, Dependability and Interoperability (SPDI) Patterns. Bellow, a number of representative SPDI Pattern Rules are presented. However, the full list of the SPDI patterns with the accompanied description can be found in the deliverable SEMIoTICS SPDI Patterns (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.semiotics-project.eu\/wp-content\/uploads\/2021\/01\/SEMIoTICS-D4.8_submitted.pdf\" target=\"_blank\">D4.8<\/a>).<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Security <ol><li><span class=\"popup-trigger popmake-738\" data-popup-id=\"738\" data-do-default=\"0\">Confidentiality<\/span> <\/li><li><span class=\"popup-trigger popmake-967\" data-popup-id=\"967\" data-do-default=\"0\">Integrity<\/span> <\/li><li><span class=\"popup-trigger popmake-1006\" data-popup-id=\"1006\" data-do-default=\"0\">Availability<\/span> <\/li><li>Non-repudiation, Auditability and Accountability <ol><li><span class=\"popup-trigger popmake-1016\" data-popup-id=\"1016\" data-do-default=\"0\">Signed Message<\/span><\/li><li><span class=\"popup-trigger popmake-1024\" data-popup-id=\"1024\" data-do-default=\"0\">Audit Log<\/span><\/li><li><span class=\"popup-trigger popmake-1029\" data-popup-id=\"1029\" data-do-default=\"0\">Authorisation<\/span><\/li><\/ol><\/li><li><span class=\"popup-trigger popmake-1029\" data-popup-id=\"1029\" data-do-default=\"0\">Authorisation<\/span> <\/li><li><span class=\"popup-trigger popmake-1039\" data-popup-id=\"1039\" data-do-default=\"0\">Authentication<\/span> <\/li><\/ol><\/li><li>Privacy<ol><li><span class=\"popup-trigger popmake-1044\" data-popup-id=\"1044\" data-do-default=\"0\">Anonymity<\/span><\/li><li><span class=\"popup-trigger popmake-1047\" data-popup-id=\"1047\" data-do-default=\"0\">Pseudonymity<\/span> <\/li><li><span class=\"popup-trigger popmake-1051\" data-popup-id=\"1051\" data-do-default=\"0\">Unlinkability<\/span><\/li><li><span class=\"popup-trigger popmake-1056\" data-popup-id=\"1056\" data-do-default=\"0\">Undetectability<\/span><\/li><\/ol><\/li><li>Dependability <ol><li><span class=\"popup-trigger popmake-1061\" data-popup-id=\"1061\" data-do-default=\"0\">Composition Reliability<\/span><\/li><li><span class=\"popup-trigger popmake-1064\" data-popup-id=\"1064\" data-do-default=\"0\">Redundancy<\/span> <\/li><li><span class=\"popup-trigger popmake-1068\" data-popup-id=\"1068\" data-do-default=\"0\">Fault Management<\/span><\/li><\/ol><\/li><li>Interoperability<ol><li><span class=\"popup-trigger popmake-1074\" data-popup-id=\"1074\" data-do-default=\"0\">Technical Interoperability<\/span> <\/li><li><span class=\"popup-trigger popmake-1080\" data-popup-id=\"1080\" data-do-default=\"0\">Syntactic Interoperability<\/span> <\/li><li><span class=\"popup-trigger popmake-1084\" data-popup-id=\"1084\" data-do-default=\"0\">Semantic Interoperability<\/span> <\/li><li><span class=\"popup-trigger popmake-1088\" data-popup-id=\"1088\" data-do-default=\"0\">Organisational Interoperability<\/span> <\/li><li><span class=\"popup-trigger popmake-1091\" data-popup-id=\"1091\" data-do-default=\"0\">E2E Interoperability<\/span> <\/li><\/ol><\/li><li><span class=\"popup-trigger popmake-1148\" data-popup-id=\"1148\" data-do-default=\"0\">QoS Bandwidth<\/span><\/li><li>Service Function Chaining<ol><li><span class=\"popup-trigger popmake-1157\" data-popup-id=\"1157\" data-do-default=\"0\">Service Function Chain Verification<\/span><\/li><li><span class=\"popup-trigger popmake-1159\" data-popup-id=\"1159\" data-do-default=\"0\">Service Function Chain Instantiation<\/span><\/li><li><span class=\"popup-trigger popmake-1153\" data-popup-id=\"1153\" data-do-default=\"0\">Virtual Service Network Function Verification<\/span><\/li><li><span class=\"popup-trigger popmake-1161\" data-popup-id=\"1161\" data-do-default=\"0\">Virtual Service Network Function Instantiation<\/span><\/li><\/ol><\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>SEMIoTICS developed a number of Security, Privacy, Dependability and Interoperability (SPDI) Patterns. Bellow, a number of representative SPDI Pattern Rules are presented. However, the full list of the SPDI patterns with the accompanied description can be found in the deliverable SEMIoTICS SPDI Patterns (D4.8). Security Confidentiality Integrity Availability Non-repudiation, Auditability and Accountability Signed Message Audit [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-712","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=\/wp\/v2\/pages\/712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=712"}],"version-history":[{"count":32,"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=\/wp\/v2\/pages\/712\/revisions"}],"predecessor-version":[{"id":1165,"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=\/wp\/v2\/pages\/712\/revisions\/1165"}],"wp:attachment":[{"href":"https:\/\/www.semiotics-project.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}