This security pattern repository is part of an ongoing project to provide expert and novice software developers with a centralized source of security patterns.
Please use the search box to the left to explore the repository. The search engine will return brief summaries of patterns, the pattern type, and the publication source. Links to the actual patterns are available to users on the UTSA network.
For more information on our research, please visit our Research page.