Home · About · A-Z Index · Search · Contacts · Press · Register · Login
    
Objective of Meeting
Summary
Outputs
Next Steps
Links


Sponsoring Forum

Security


Meeting Report:
Security Forum Design Patterns Workshop

Objective of Meeting

This Workshop was a tutorial and demonstration of how to organize and run a Design Patterns Writers' Workshop. A design patterns expert - Dr Steven Berczuk - accepted the invitation to run this workshop. It was organized to cover the following agenda:

  1. Goals, structure, roles of pattern workshops (Steve B.) - 40 mins.
  2. Q&A and discussion of pattern workshops (All) - 20 mins.
  3. Sample pattern workshop (Bob Blakley to be Author, Steve Berczuk to be moderator) - 45 mins.
  4. Post-mortem discussion of pattern workshop - 15 mins.

Summary

Bob welcomed Steve Berczuk, and the gathering of 17 would-be participants and onlookers. Steve is a design patterns expert who is also experienced in running writers workshops, which are proven to be effective in past PLoP conferences and which he recommends we use in our planned series of workshops.

After a round of introductions, Bob explained that he aims to resolve all the outstanding Change Request issues following the close of the formal review period for our "Technical Guide to Security Design Patterns". We hope to be able to publish it as Version 1 by the end of August. The existing company review draft is available to members (see Links below).

Bob went on to explain that we plan to test the completeness and fitness for purpose of the design patterns in this document, by holding "writers workshops" to review the definitions. These writers workshops will generate feedback on their usability and veracity, so providing information that we will incorporate into the next version. It is our intention to attract design pattern experts to these writers workshops to assure we get high-quality feedback. We plan to run two writers workshops in each of our next two meetings - Washington, DC (20-24 Oct 2003) and San Diego (2-6 Feb 2004).

Steve Berczuk then proceeded to describe how to run an effective design patterns writers workshop, first explaining how it uses a central group of up to eight reviewer participants, plus the pattern author and a moderator. This group sits in a circle. The onlookers may listen but not speak unless invited by the moderator, and in general the audience will only be invited to comment at the end of the workshop.

Each workshop takes about one hour. Its structure is:

  • Introduction/reading - the moderator introduces the author and the author reads a selection from his design pattern. This is the last we hear from the author until the end. Allow 5 minutes.
  • Summary - one of the workshop participants summarizes their impression of the intent of the paper. Allow 5 minutes.
  • Positive feedback - the moderator asks for things the participants liked about the pattern. Comments can be about the presentation or the content, and at the discretion of the moderator comments about presentation can be intermingled or handled separately. Allow 15 minutes.
  • Constructive criticism - the moderator asks for ways in which the paper can be improved, both in content and presentation. Allow 20-25 minutes.
  • Author feedback - the author asks for clarification on comments made during the session. The author should pick on the most important points or ones made by more than one participant. Further clarification can be pursued in off-line discussion. Allow 10 minutes.
  • Close - the workshop participants thank the author.

Steve and Bob had selected the "Checkpointed System" pattern as the sample design pattern for review in this meeting. It appears in Section 7.2 of the Company Review draft of the Security Design Patterns Guide (pages 31 through 33). This draft is available to members (see Links below.)

In preparation for this workshop, Steve and Bob explained that reviewer participants and the audience should have read the pattern carefully, read pages 6 and 7 of the Patterns Guide to remind themselves what to look for in a good pattern, and prepare three types of comments - a summary in their own words of what the pattern is about, things they like in the pattern, and suggestions for improvement.

Steve and Bob then selected a group of five participants to join them in the reviewer-participant circle, and proceeded to demonstrate the process by running a practice writers workshop as a tutorial, using the selected pattern, with Bob as the author and himself as the moderator. Steve broke out of his moderator role occasionally to handle queries and steer the participants (and occasionally the less-than-quiet audience of onlookers) back onto the right track.

At the end of the tutorial demonstration, Steve and Bob handled further observations before Steve had to leave.

Bob closed the session with a vote of thanks to Steve which all endorsed.

Outputs

Understanding of the Design Patterns writers workshop process, through presentation of its rationale and demonstration/observation in a tutorial.

In addition, Bob gathered useful feedback on how well the existing draft of the Checkpointed System design pattern is defined, along with some significant improvement points which he will apply when preparing the pre-publication corrections to the Technical Guide to Security Design Patterns.

Next Steps

Use the writers workshop process to set up and run two sessions at the next meeting (in Washington, DC) and two more in the following meeting (in San Diego), each session having several hour-long workshops so we review all the design patterns in our existing security design patterns catalog.

Links

Company Review draft of the Security Design Patterns Guide, available to members at: www.opengroup.org/projects/sec-des-pat/ - remember to login to access it.


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Friday, 22 August 2003