메뉴 건너뛰기




Volumn , Issue 5, 2008, Pages 35-48

A survey on security patterns

Author keywords

Design patterns; Refactoring; Security; Security patterns; Software engineering

Indexed keywords

DESIGN PATTERNS; REFACTORING; SECURITY PATTERNS;

EID: 42449139876     PISSN: 13498614     EISSN: 13498606     Source Type: Journal    
DOI: 10.2201/NiiPi.2008.5.5     Document Type: Review
Times cited : (141)

References (76)
  • 3
    • 33750131444 scopus 로고    scopus 로고
    • Security quality requirements engineering (square) methodology,
    • Technical Report CMU/SEI-2005-TR-009, CMU/SEI
    • E. Houg, N. R. Mead and T. R. Stehney, "Security quality requirements engineering (square) methodology," Technical Report CMU/SEI-2005-TR-009, CMU/SEI, 2005.
    • (2005)
    • Houg, E.1    Mead, N.R.2    Stehney, T.R.3
  • 4
    • 3142750497 scopus 로고    scopus 로고
    • Tropos: An agent-oriented software development methodology
    • P. Bresciani, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, "Tropos: An agent-oriented software development methodology," JAAMAS, vol.8, no.3, pp.203-236, 2004.
    • (2004) JAAMAS , vol.8 , Issue.3 , pp. 203-236
    • Bresciani, P.1    Giorgini, P.2    Giunchiglia, F.3    Mylopoulos, J.4
  • 8
    • 42449124129 scopus 로고    scopus 로고
    • Information security antipatterns in software requirements engineering
    • M. Kis, "Information security antipatterns in software requirements engineering," in the PLoP 2002 conference, 2002.
    • (2002) the PLoP 2002 conference
    • Kis, M.1
  • 20
    • 58049175181 scopus 로고    scopus 로고
    • Integrating Security and Software Engineering: Advances and Future Vision
    • Chapter VI:, Idea Group Publishing
    • M. Weiss, Integrating Security and Software Engineering: Advances and Future Vision, Chapter VI: Modelling Security Patterns Using NFR Analysis, pp. 127-141, Idea Group Publishing, 2006.
    • (2006) Modelling Security Patterns Using NFR Analysis , pp. 127-141
    • Weiss, M.1
  • 22
    • 42449126669 scopus 로고    scopus 로고
    • F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture 1: A System of Patterns, Wiley, 1996.
    • F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture Volume 1: A System of Patterns, Wiley, 1996.
  • 25
    • 42449150412 scopus 로고    scopus 로고
    • Secure pre-forking - a pattern for performance and security
    • M. Hafiz, "Secure pre-forking - a pattern for performance and security," in Proceedings of PLoP 2005 Conference, 2005.
    • (2005) Proceedings of PLoP 2005 Conference
    • Hafiz, M.1
  • 28
    • 42449136586 scopus 로고    scopus 로고
    • Computer Security: Art and Science
    • Chapter 29:, Addison Wesley
    • M. Bishop, Computer Security: Art and Science, Chapter 29: Program Security, pp.869-921, Addison Wesley, 2003.
    • (2003) Program Security , pp. 869-921
    • Bishop, M.1
  • 29
    • 2342565140 scopus 로고    scopus 로고
    • Secure Coding: Principles and Practices
    • Chapter 4:, O'Reilly
    • M. G. Graff and K. R. Wyk, Secure Coding: Principles and Practices, Chapter 4: Implementation, pp.99-123, O'Reilly, 2003.
    • (2003) Implementation , pp. 99-123
    • Graff, M.G.1    Wyk, K.R.2
  • 32
    • 0034270432 scopus 로고    scopus 로고
    • Statically scanning java code: Finding security vulnerabilities
    • J. Viega, G. McGraw, T. Mutdosch, and E.W. Felten, "Statically scanning java code: Finding security vulnerabilities," IEEE Software, vol.17, no.5, pp.68-74, 2000.
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 68-74
    • Viega, J.1    McGraw, G.2    Mutdosch, T.3    Felten, E.W.4
  • 36
    • 0003547217 scopus 로고    scopus 로고
    • 2nd ed. Addison-Wesley
    • S. Oaks, Java Security, 2nd ed. Addison-Wesley, 2001.
    • (2001) Java Security
    • Oaks, S.1
  • 48
    • 0029333530 scopus 로고
    • Logical foundations of object oriented and frame based languages
    • M. Kifer, G. Lausen, and J. Wu, "Logical foundations of object oriented and frame based languages," Journal of ACM, vol.42, pp.741-843, 1995.
    • (1995) Journal of ACM , vol.42 , pp. 741-843
    • Kifer, M.1    Lausen, G.2    Wu, J.3
  • 52
    • 34547107609 scopus 로고    scopus 로고
    • Organizing security patterns
    • M. Hafiz, P. Adamczyk, and R.E. Johnson, "Organizing security patterns," IEEE Software, vol.24, no.4, pp.52-60, 2007.
    • (2007) IEEE Software , vol.24 , Issue.4 , pp. 52-60
    • Hafiz, M.1    Adamczyk, P.2    Johnson, R.E.3
  • 53
    • 42449118455 scopus 로고    scopus 로고
    • Commission of European Communities, Information technology security evaluation criteria, version 1.2, 1991
    • Commission of European Communities, Information technology security evaluation criteria, version 1.2, 1991.
  • 54
    • 0001134191 scopus 로고
    • A framework for information systems architecture
    • J. A. Zachman, "A framework for information systems architecture," IBM Systems Journal, vol.26, no.3, 1987.
    • (1987) IBM Systems Journal , vol.26 , Issue.3
    • Zachman, J.A.1
  • 58
    • 38549112088 scopus 로고    scopus 로고
    • An inventory of security patterns,
    • Technical Report CW-469, Katholieke Universiteit Leuven, Department of Computer Science
    • K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, "An inventory of security patterns," in Technical Report CW-469, Katholieke Universiteit Leuven, Department of Computer Science, 2006.
    • (2006)
    • Yskout, K.1    Heyman, T.2    Scandariato, R.3    Joosen, W.4
  • 59
    • 42449084135 scopus 로고    scopus 로고
    • Microsoft, Patternshare; http://patternshare.org/.
    • Microsoft, Patternshare; http://patternshare.org/.
  • 60
    • 84871420984 scopus 로고    scopus 로고
    • Cunningham & Cunningham, Inc
    • Cunningham & Cunningham, Inc., Portland pattern repository; http://c2.com/ppr/.
    • Portland pattern repository
  • 66
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • I. Ray, R. France, N. Li, and G. Georg, "An aspect-based approach to modeling access control concerns," Information and Software Technology, vol.46, no.9, pp.575-587, 2004.
    • (2004) Information and Software Technology , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.2    Li, N.3    Georg, G.4
  • 68
    • 24344438696 scopus 로고    scopus 로고
    • Secure software development by example
    • A. Apvrille and M. Pourzandi, "Secure software development by example," IEEE Security & Privacy, vol.3, no.4, pp.10-17, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.4 , pp. 10-17
    • Apvrille, A.1    Pourzandi, M.2
  • 69
    • 23844500788 scopus 로고    scopus 로고
    • Defect frequency and design patterns: An empirical study of industrial code
    • M. Vokac, "Defect frequency and design patterns: an empirical study of industrial code," Transactions on Software Engineering, vol.30, no.12, pp.904-917, 2004.
    • (2004) Transactions on Software Engineering , vol.30 , Issue.12 , pp. 904-917
    • Vokac, M.1
  • 72
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management: Model, methodology, and reasoning
    • Proc. of iTrust'04, Springer-Verlag
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements engineering meets trust management: Model, methodology, and reasoning," in Proc. of iTrust'04, LNCS 2995, pp.176-190, Springer-Verlag, 2004.
    • (2004) LNCS , vol.2995 , pp. 176-190
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 73
    • 3042647673 scopus 로고    scopus 로고
    • Misuse and abuse cases: Getting past the positive
    • P. Hope, G. McGraw, and A.I. Anton, "Misuse and abuse cases: Getting past the positive," IEEE Security & Privacy, vol.2, no.3, pp.90-92, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 90-92
    • Hope, P.1    McGraw, G.2    Anton, A.I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.