메뉴 건너뛰기




Volumn 16, Issue 5, 2006, Pages 519-536

Security patterns and requirements for internet-based applications

Author keywords

Computer applications; Security products; Worldwide web

Indexed keywords


EID: 33750441515     PISSN: 10662243     EISSN: None     Source Type: Journal    
DOI: 10.1108/10662240610710996     Document Type: Article
Times cited : (31)

References (51)
  • 3
    • 33750462341 scopus 로고    scopus 로고
    • "E-P3P privacy policies and privacy authorization", Workshop on Privacy in the Electronic Society, WPES'02, Washington, DC
    • Ashley, P., Hada, S., Karjoth, G. and Schunter, M. (2002), "E-P3P privacy policies and privacy authorization", Workshop on Privacy in the Electronic Society, WPES'02, Washington, DC.
    • (2002)
    • Ashley, P.1    Hada, S.2    Karjoth, G.3    Schunter, M.4
  • 7
    • 33750491922 scopus 로고    scopus 로고
    • "Building software with patterns", paper presented at the 2nd European Conference on Pattern Languages of Programs (EuroPLoP 1999), Irsee, Germany
    • Buschmann, F. (1999), "Building software with patterns", paper presented at the 2nd European Conference on Pattern Languages of Programs (EuroPLoP 1999), Irsee, Germany.
    • (1999)
    • Buschmann, F.1
  • 9
    • 33750493590 scopus 로고    scopus 로고
    • CERT (2006), Statistics 1988-2006, available at: www.cert.org/stats/ certstats.htmlincidents.
    • (2006) Statistics 1988-2006
  • 11
    • 33750461249 scopus 로고    scopus 로고
    • "Web services: why and how", Workshop on Object Orientation and Web Services OOWS2001, Tampa, FL
    • Curbera, F., Nagy, W.A. and Weerawarana, S. (2001), "Web services: why and how", Workshop on Object Orientation and Web Services OOWS2001, Tampa, FL.
    • (2001)
    • Curbera, F.1    Nagy, W.A.2    Weerawarana, S.3
  • 12
    • 33750437242 scopus 로고    scopus 로고
    • "Using security patterns to model and analyze security requirements", High Assurance Systems Workshop (RHAS 03) as part of the IEEE Joint International Conference on Requirements Engineering (RE 03), Monterey Bay, CA
    • Cheng, B.H.C., Konrad, S., Campbell, L.A. and Wassermann, R. (2003), "Using security patterns to model and analyze security requirements", High Assurance Systems Workshop (RHAS 03) as part of the IEEE Joint International Conference on Requirements Engineering (RE 03), Monterey Bay, CA.
    • (2003)
    • Cheng, B.H.C.1    Konrad, S.2    Campbell, L.A.3    Wassermann, R.4
  • 15
    • 33750456157 scopus 로고    scopus 로고
    • Web Services Reliability (WS-Reliability) Ver1.0. January 8, available at: www.oracle.com/technology/tech/webservices/htdocs/spec/WS-ReliabilityV1.0. pdf
    • Evans, C., Chappell, D., Bunting, D., Tharakan, G., Shimamura, H., Durand, J., Mischkinsky, J. and Nihei, K. et al. (2003), Web Services Reliability (WS-Reliability) Ver1.0. January 8, available at: www.oracle.com/technology/tech/webservices/htdocs/spec/WS-ReliabilityV1.0.pdf.
    • (2003)
    • Evans, C.1    Chappell, D.2    Bunting, D.3    Tharakan, G.4    Shimamura, H.5    Durand, J.6    Mischkinsky, J.7    Nihei, K.8
  • 16
    • 33750439437 scopus 로고    scopus 로고
    • "Patterns for operating systems access control", paper presented at the 9th Conference on Pattern Languages of Programs, PLoP 2002, Allerton Park, IL
    • Fernandez, E.B. (2002), "Patterns for operating systems access control", paper presented at the 9th Conference on Pattern Languages of Programs, PLoP 2002, Allerton Park, IL.
    • (2002)
    • Fernandez, E.B.1
  • 17
    • 33750473361 scopus 로고    scopus 로고
    • "A pattern language for security models", paper presented at the 8th Conference on Pattern Languages of Programs, PLoP 2001, Allerton Park, Monticello, IL
    • Fernandez, E.B. and Pan, R. (2001), "A pattern language for security models", paper presented at the 8th Conference on Pattern Languages of Programs, PLoP 2001, Allerton Park, Monticello, IL.
    • (2001)
    • Fernandez, E.B.1    Pan, R.2
  • 18
    • 33750461248 scopus 로고    scopus 로고
    • "A pattern language for firewalls", paper presented at the 10th Conference on Pattern Languages of Programs (PLoP'2003), Allerton Park, Monticello, IL
    • Fernandez, E.B., Petrie, M.L., Seliya, N. and Herzberg, A. (2003), "A pattern language for firewalls", paper presented at the 10th Conference on Pattern Languages of Programs (PLoP'2003), Allerton Park, Monticello, IL.
    • (2003)
    • Fernandez, E.B.1    Petrie, M.L.2    Seliya, N.3    Herzberg, A.4
  • 19
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Firesmith, D.G. (2003), "Engineering security requirements", Journal of Object Technology, Vol. 2 No. 1, pp. 53-68.
    • (2003) Journal of Object Technology , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.G.1
  • 20
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith, D.G. (2004), "Specifying reusable security requirements", Journal of Object Technology, Vol. 3, pp. 61-75.
    • (2004) Journal of Object Technology , vol.3 , pp. 61-75
    • Firesmith, D.G.1
  • 21
    • 33750434486 scopus 로고    scopus 로고
    • "Data filter architecture pattern", paper presented at the 6th Conference on Pattern Languages of Programs, PLoP 1999, Allerton Park, Monticello, IL
    • Flanders, R. and Fernandez, E.B. (1999), "Data filter architecture pattern", paper presented at the 6th Conference on Pattern Languages of Programs, PLoP 1999, Allerton Park, Monticello, IL.
    • (1999)
    • Flanders, R.1    Fernandez, E.B.2
  • 25
    • 33750481204 scopus 로고    scopus 로고
    • "PWSSec: process for web services security", paper presented at the IEEE International Conference on Web Services, Orlando, FL
    • Gutiérrez, C., Fernández-Medina, E. and Piattini, M. (2005a), "PWSSec: process for web services security", paper presented at the IEEE International Conference on Web Services, Orlando, FL.
    • (2005)
    • Gutiérrez, C.1    Fernández-Medina, E.2    Piattini, M.3
  • 26
    • 33750459866 scopus 로고    scopus 로고
    • "Web services-based security requirement elicitation", paper presented at 1st International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER 2005), in conjunction with RE 05 - 13th IEEE International Requirements Engineering Conference, Paris, France
    • Gutiérrez, C., Fernández-Medina, E. and Piattini, M. (2005b), "Web services-based security requirement elicitation", paper presented at 1st International Workshop on Service-Oriented Computing: Consequences for Engineering Requirements (SOCCER 2005), in conjunction with RE 05 - 13th IEEE International Requirements Engineering Conference, Paris, France.
    • (2005)
    • Gutiérrez, C.1    Fernández-Medina, E.2    Piattini, M.3
  • 27
    • 33750438064 scopus 로고    scopus 로고
    • "Web services enterprise security architecture: a case study", Workshop on Security on Web Services, Fairfax, VA
    • Gutiérrez, C., Fernández-Medina, E. and Piattini, M. (2005c), "Web services enterprise security architecture: a case study", Workshop on Security on Web Services, Fairfax, VA.
    • (2005)
    • Gutiérrez, C.1    Fernández-Medina, E.2    Piattini, M.3
  • 28
    • 33750474063 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and CRL Profile, Internet Eng. Task Force RFC 2459, January
    • Housley, R., Ford, W., Polk, W. and Solo, D. (1999), Internet X.509 Public Key Infrastructure Certificate and CRL Profile, Internet Eng. Task Force RFC 2459, January.
    • (1999)
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 31
    • 33750447271 scopus 로고    scopus 로고
    • "Patterns for securing web services messaging", OOPSLA'03 Workshop for Web Services and Service Oriented Architecture Best Practice and Patterns, Anaheim, CA
    • Imamura, T. and Tatsubori, M. (2003), "Patterns for securing web services messaging", OOPSLA'03 Workshop for Web Services and Service Oriented Architecture Best Practice and Patterns, Anaheim, CA.
    • (2003)
    • Imamura, T.1    Tatsubori, M.2
  • 32
    • 33750460231 scopus 로고    scopus 로고
    • "Information Security antipatterns in software requirements engineering", paper presented at the 9th Conference on Pattern Languages of Programs (PLoP'2002), Allterton Park, Monticello, IL
    • Kis, M. (2002), "Information Security antipatterns in software requirements engineering", paper presented at the 9th Conference on Pattern Languages of Programs (PLoP'2002), Allterton Park, Monticello, IL.
    • (2002)
    • Kis, M.1
  • 33
    • 33750466871 scopus 로고    scopus 로고
    • "The authenticator pattern", paper presented at the 6th Conference on Pattern Languages of Programs, PLoP 1999, Allerton Park, Monticello, IL
    • Lee Brown, J.F., DiVietri, J., Diaz de Villegas, G. and Fernandez, E.B. (1999), "The authenticator pattern", paper presented at the 6th Conference on Pattern Languages of Programs, PLoP 1999, Allerton Park, Monticello, IL.
    • (1999)
    • Lee Brown, J.F.1    Divietri, J.2    Diaz De Villegas, G.3    Fernandez, E.B.4
  • 34
    • 33750465509 scopus 로고    scopus 로고
    • "Pattern language for cryptographic key management", paper presented at the 7th European Conference on Pattern Languages of Programs (EuroPlop'2002), Irsee, Germany
    • Lehtoren, S. and Pärssinen, J. (2002), "Pattern language for cryptographic key management", paper presented at the 7th European Conference on Pattern Languages of Programs (EuroPlop'2002), Irsee, Germany.
    • (2002)
    • Lehtoren, S.1    Pärssinen, J.2
  • 36
    • 70349518187 scopus 로고    scopus 로고
    • OASIS (2005), Quality Model for Web Services, Available at: www.oasis-open.org/committees/download.php/15910/WSQM-ver-2.0.doc.
    • (2005) Quality Model for Web Services
  • 42
    • 72949106429 scopus 로고    scopus 로고
    • available at: www.cgisecurity.com/lib/securityDesignPatterns.html
    • Romanosky, S. (2001), Security Design Patterns, available at: www.cgisecurity.com/lib/securityDesignPatterns.html.
    • (2001) Security Design Patterns
    • Romanosky, S.1
  • 43
    • 33750467943 scopus 로고    scopus 로고
    • "Enterprise security patterns", paper presented at the 7th European Conference on Pattern Languages of Programs (EuroPlop'02), Irsee, Germany
    • Romanosky, S. (2002), "Enterprise security patterns", paper presented at the 7th European Conference on Pattern Languages of Programs (EuroPlop'02), Irsee, Germany.
    • (2002)
    • Romanosky, S.1
  • 44
    • 33750946214 scopus 로고    scopus 로고
    • "A study of security architectural patterns", paper presented at the 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, IEEE Computer Society, available at: http://csdl.computer.org/dl/proceedings/ares/2006/2567/00/25670358.pdf
    • Rosado, D.G., Gutiérrez, C., Fernandez-Medina, E. and Piattini, M. (2006), "A study of security architectural patterns", paper presented at the 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria, IEEE Computer Society, available at: http://csdl.computer.org/dl/proceedings/ares/2006/2567/00/25670358.pdf.
    • (2006)
    • Rosado, D.G.1    Gutiérrez, C.2    Fernandez-Medina, E.3    Piattini, M.4
  • 47
    • 33750475206 scopus 로고    scopus 로고
    • W3C (2004), Services Architecture, available at: www.w3.org/TR/2004/NOTE- ws-arch-20040211/.
    • (2004) Services Architecture
  • 49
    • 33750477640 scopus 로고    scopus 로고
    • "A semantic approach for access control in web services", paper presented at the Euroweb 2002 International Conference, W3C & British Computer Society Electronic Workshops in Computing (eWiC), Oxford
    • Yagüe, M.I. and Troya, J.M. (2002), "A semantic approach for access control in web services", paper presented at the Euroweb 2002 International Conference, W3C & British Computer Society Electronic Workshops in Computing (eWiC), Oxford.
    • (2002)
    • Yagüe, M.I.1    Troya, J.M.2
  • 51
    • 33750454427 scopus 로고    scopus 로고
    • "Architectural patterns for enabling application security", paper presented at the 4th Conference on Patterns Language of Programming, PLop 1997, Monticello, IL
    • Yoder, J. and Barcalow, J. (1997), "Architectural patterns for enabling application security", paper presented at the 4th Conference on Patterns Language of Programming, PLop 1997, Monticello, IL.
    • (1997)
    • Yoder, J.1    Barcalow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.