Abstract
No abstract available.
Cited By
- Athinaiou M, Mouratidis H, Fotis T and Pavlidis M A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems Computer Security, (140-158)
- Salva S and Regainia L (2019). An approach for guiding developers in the choice of security solutions and in the generation of concrete test cases, Software Quality Journal, 27:2, (675-701), Online publication date: 1-Jun-2019.
- Washizaki H, Yu Y, Kaiya H, Yoshioka N, Hu Z, Xiong Y and Hosseinian-Far A (2017). Goal Modelling for Security Problem Matching and Pattern Enforcement, International Journal of Secure Software Engineering, 8:3, (42-57), Online publication date: 1-Jul-2017.
- Ruiz J, Arjona M, Maña A and Rudolph C (2017). Security knowledge representation artifacts for creating secure IT systems, Computers and Security, 64:C, (69-91), Online publication date: 1-Jan-2017.
- Hamid B and Perez J (2016). Supporting pattern-based dependability engineering via model-driven development, Journal of Systems and Software, 122:C, (239-273), Online publication date: 1-Dec-2016.
- Jasser S and Riebisch M Reusing security solutions Proccedings of the 10th European Conference on Software Architecture Workshops, (1-7)
- Berger B, Sohr K and Koschke R Automatically Extracting Threats from Extended Data Flow Diagrams Proceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 9639, (56-71)
- Bouaziz R and Kammoun S A Decision Support Map for Security Patterns Application Proceedings, Part IV, of the 15th International Conference on Computational Science and Its Applications -- ICCSA 2015 - Volume 9158, (750-759)
- Hamid B and Percebois C A Modeling and Formal Approach for the Precise Specification of Security Patterns Proceedings of the 6th International Symposium on Engineering Secure Software and Systems - Volume 8364, (95-112)
- Maña A, Fernandez E, Ruiz J and Rudolph C Towards computer-oriented security patterns Proceedings of the 20th Conference on Pattern Languages of Programs, (1-14)
- Preschern C, Kajtazovic N and Kreiner C Building a safety architecture pattern system Proceedings of the 18th European Conference on Pattern Languages of Program, (1-55)
- Radermacher A, Hamid B, Fredj M and Profizi J Process and tool support for design patterns with safety requirements Proceedings of the 18th European Conference on Pattern Languages of Program, (1-16)
- Preschern C Catalog of security tactics linked to common criteria requirements Proceedings of the 19th Conference on Pattern Languages of Programs, (1-17)
- Kost M and Freytag J Privacy analysis using ontologies Proceedings of the second ACM conference on Data and Application Security and Privacy, (205-216)
- Ruiz J, Harjani R and Maña A A security-focused engineering process for systems of embedded components Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss, (1-9)
- Muñoz A and Maña A Facilitating the use of TPM technologies using the serenity framework Proceedings of the 8th international conference on Autonomic and trusted computing, (164-174)
- van Veenstra A and Ramilli M Exploring information security issues in public sector inter-organizational collaboration Proceedings of the 10th IFIP WG 8.5 international conference on Electronic government, (355-366)
- Bouaziz R, Hamid B and Desnos N Towards a better integration of patterns in secure component-based systems design Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V, (607-621)
- Hamid B, Desnos N, Grepet C and Jouvray C Model-based security and dependability patterns in RCES Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, (1-4)
- Busnel P and Giroux S Security, privacy, and dependability in smart homes Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematics, (24-31)
- Schnjakin M, Menzel M and Meinel C A pattern-driven security advisor for service-oriented architectures Proceedings of the 2009 ACM workshop on Secure web services, (13-20)
- Supakkul S, Hill T, Chung L and Oladimeji E Goal-oriented security threat mitigation patterns Proceedings of the 16th Conference on Pattern Languages of Programs, (1-15)
- Busnel P, El Khoury P, Li K, Saidane A and Zannone N (2009). S&D Pattern Deployment at Organizational Level, Electronic Notes in Theoretical Computer Science (ENTCS), 244, (27-39), Online publication date: 1-Aug-2009.
- Parrend P and Frenot S (2009). Security benchmarks of OSGi platforms: toward Hardened OSGi, Software—Practice & Experience, 39:5, (471-499), Online publication date: 1-Apr-2009.
- Fenz S and Ekelhart A Formalizing information security knowledge Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (183-194)
- Compagna L, El Khoury P, Krausová A, Massacci F and Zannone N (2009). How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns, Artificial Intelligence and Law, 17:1, (1-30), Online publication date: 1-Mar-2009.
- Yu Y, Kaiya H, Washizaki H, Xiong Y, Hu Z and Yoshioka N Enforcing a security pattern in stakeholder goal models Proceedings of the 4th ACM workshop on Quality of protection, (9-14)
- Horvath V and Dörges T From security patterns to implementation using petri nets Proceedings of the fourth international workshop on Software engineering for secure systems, (17-24)
- Breu R, Popp G and Alam M (2007). Model based development of access policies, International Journal on Software Tools for Technology Transfer (STTT), 9:5-6, (457-470), Online publication date: 1-Oct-2007.
- Compagna L, Khoury P, Massacci F, Thomas R and Zannone N How to capture, model, and verify the knowledge of legal, security, and privacy experts Proceedings of the 11th international conference on Artificial intelligence and law, (149-153)
- Alam M, Hafner M and Breu R A constraint based role based access control in the SECTET a model-driven approach Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-13)
- Alam M Model driven security engineering for the realization of dynamic security requirements in collaborative systems Proceedings of the 2006 international conference on Models in software engineering, (278-287)
- Hafner M, Alam M and Breu R Towards a MOF/QVT-Based domain architecture for model driven security Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems, (275-290)
- Balopoulos T, Gymnopoulos L, Karyda M, Kokolakis S, Gritzalis S and Katsikas S A framework for exploiting security expertise in application development Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business, (62-70)
- Mouratidis H, Jürjens J and Fox J Towards a comprehensive framework for secure systems development Proceedings of the 18th international conference on Advanced Information Systems Engineering, (48-62)
- Mouratidis H, Weiss M and Giorgini P Security patterns meet agent oriented software engineering Proceedings of the 24th international conference on Conceptual Modeling, (225-240)
- Babar M, Wang X and Gorton I Supporting security sensitive architecture design Proceedings of the First international conference on Quality of Software Architectures and Software Quality, and Proceedings of the Second International conference on Software Quality, (140-154)
Index Terms
- Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
Software-security patterns: degree of maturity
EuroPLoP '15: Proceedings of the 20th European Conference on Pattern Languages of ProgramsSince Gamma et al. published their design patterns, patterns are very popular in the area of software engineering. They provide best practice to handle recurring problems during the software development phase. Three years later, security patterns ...