Kienzle et al., 2002 - Google Patents
Security patterns repository version 1.0Kienzle et al., 2002
View PDF- Document ID
- 12716809020290701005
- Author
- Kienzle D
- Elder M
- Tyree D
- Edwards-Hewitt J
- Publication year
- Publication venue
- DARPA, Washington DC
External Links
Snippet
A security pattern is a well-understood solution to a recurring information security problem. They are patterns in the sense originally defined by Christopher Alexander (the basis for much of the later work in design patterns and pattern languages of programs), applied to the …
- 238000000034 method 0 abstract description 55
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kienzle et al. | Security patterns repository version 1.0 | |
Iqbal et al. | On cloud security attacks: A taxonomy and intrusion detection and prevention as a service | |
KR101497742B1 (en) | System and method for authentication, data transfer, and protection against phising | |
Kesh et al. | A framework for analyzing e‐commerce security | |
Atashzar et al. | A survey on web application vulnerabilities and countermeasures | |
Mishra et al. | Security threats and recent countermeasures in cloud computing | |
Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
Talukder et al. | Architecting secure software systems | |
Alsmadi et al. | Practical information security | |
Lepofsky | The manager's guide to web application security: a concise guide to the weaker side of the web | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
Indu et al. | Ransomware: A New Era of Digital Terrorism | |
Pilania et al. | Zeus: In-Depth Malware Analysis of Banking Trojan Malware | |
Verbitskiy | Node. js security | |
US20240022546A1 (en) | Master ledger and local host log extension detection and mitigation of forged authentication attacks | |
Khan | The Most In-depth Hacker's Guide | |
Sharma et al. | Web security vulnerabilities: Identification, exploitation, and mitigation | |
MACENA | CYBER SECURITY AND DATA PROTECTION | |
Gupta et al. | Unveiling Cyber Threats and Digital Forensics | |
Sable et al. | Structured Approach to Web Security: Exploring Evolving Threats and Unresolved Research Challenges | |
Adebayo et al. | CST 805: Computer and Network Security | |
Threats | Security Threat Report 2013 | |
Foss et al. | Web application security | |
Mannan | Authentication and securing personal information in an untrusted internet | |
Kannamanani | Software to provide security for Web Browser Cookies and Passwords using Trusted Computing Technology |