-
2
-
-
33750050331
-
-
John Wiley & Sons Inc
-
M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security And Systems Engineering, John Wiley & Sons Inc, 2006.
-
(2006)
Security Patterns: Integrating Security And Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
3
-
-
33750131444
-
Security quality requirements engineering (square) methodology,
-
Technical Report CMU/SEI-2005-TR-009, CMU/SEI
-
E. Houg, N. R. Mead and T. R. Stehney, "Security quality requirements engineering (square) methodology," Technical Report CMU/SEI-2005-TR-009, CMU/SEI, 2005.
-
(2005)
-
-
Houg, E.1
Mead, N.R.2
Stehney, T.R.3
-
4
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
P. Bresciani, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, "Tropos: An agent-oriented software development methodology," JAAMAS, vol.8, no.3, pp.203-236, 2004.
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
-
8
-
-
42449124129
-
Information security antipatterns in software requirements engineering
-
M. Kis, "Information security antipatterns in software requirements engineering," in the PLoP 2002 conference, 2002.
-
(2002)
the PLoP 2002 conference
-
-
Kis, M.1
-
10
-
-
27644537252
-
Modelling security requirements through ownership, permission and delegation
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Modelling security requirements through ownership, permission and delegation," in 13th IEEE International Conference on Requirements Engineering 2005, pp.167-176, 2005.
-
(2005)
13th IEEE International Conference on Requirements Engineering
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
11
-
-
33745804721
-
Modelling secure systems using an agent-oriented approach and security patterns
-
H. Mouratidis, M. Weiss, and P. Giorgini, "Modelling secure systems using an agent-oriented approach and security patterns," International Journal of Software Engineering and Knowledge Engineering, vol.16, no.3, pp.471-498, 2006.
-
(2006)
International Journal of Software Engineering and Knowledge Engineering
, vol.16
, Issue.3
, pp. 471-498
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
12
-
-
33746660228
-
Security engineering using problem frames
-
Springer Berlin, Heidelberg
-
D. Hatebur, M. Heisel, and H. Schmidt, "Security engineering using problem frames," in Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS), vol.3995, pp.238-253, Springer Berlin, Heidelberg, 2006.
-
(2006)
Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS)
, vol.3995
, pp. 238-253
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
13
-
-
34548181856
-
A pattern system for security requirements engineering
-
IEEE
-
D. Hatebur, M. Heisel, and H. Schmidt, "A pattern system for security requirements engineering," in Proceedings of the International Conference on Availability, Reliability and Security (AReS), pp.356-365, IEEE, 2007.
-
(2007)
Proceedings of the International Conference on Availability, Reliability and Security (AReS)
, pp. 356-365
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
14
-
-
42449136587
-
A security engineering process based on patterns
-
IEEE
-
D. Hatebur, M. Heisel, and H. Schmidt, "A security engineering process based on patterns," in Proceedings of the International Workshop on Database and Expert Systems Applications (DEXA), pp.734-738, IEEE, 2007.
-
(2007)
Proceedings of the International Workshop on Database and Expert Systems Applications (DEXA)
, pp. 734-738
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
17
-
-
0003880013
-
-
Addison-Wesley Professional
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
18
-
-
33750490069
-
-
Prentice Hall
-
C. Steel, R. Nagappan, and R. Lai, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, Prentice Hall, 2005.
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
20
-
-
58049175181
-
Integrating Security and Software Engineering: Advances and Future Vision
-
Chapter VI:, Idea Group Publishing
-
M. Weiss, Integrating Security and Software Engineering: Advances and Future Vision, Chapter VI: Modelling Security Patterns Using NFR Analysis, pp. 127-141, Idea Group Publishing, 2006.
-
(2006)
Modelling Security Patterns Using NFR Analysis
, pp. 127-141
-
-
Weiss, M.1
-
22
-
-
42449126669
-
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture 1: A System of Patterns, Wiley, 1996.
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture Volume 1: A System of Patterns, Wiley, 1996.
-
-
-
-
23
-
-
0003994935
-
-
Second Edition, Prentice Hall
-
D. Alur, J. Crupi, and D. Malks, Core J2EE Patterns: Best Practices and Design Strategies, Second Edition, Prentice Hall, 2003.
-
(2003)
Core J2EE Patterns: Best Practices and Design Strategies
-
-
Alur, D.1
Crupi, J.2
Malks, D.3
-
25
-
-
42449150412
-
Secure pre-forking - a pattern for performance and security
-
M. Hafiz, "Secure pre-forking - a pattern for performance and security," in Proceedings of PLoP 2005 Conference, 2005.
-
(2005)
Proceedings of PLoP 2005 Conference
-
-
Hafiz, M.1
-
27
-
-
67449101466
-
Privacy patterns for online interactions
-
S. Romanosky, A. Acquisti, J. Hong, L. F. Cranor, and B. Friedman, "Privacy patterns for online interactions," in Proceedings of PLoP 2006 Conference, 2006.
-
(2006)
Proceedings of PLoP 2006 Conference
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.F.4
Friedman, B.5
-
28
-
-
42449136586
-
Computer Security: Art and Science
-
Chapter 29:, Addison Wesley
-
M. Bishop, Computer Security: Art and Science, Chapter 29: Program Security, pp.869-921, Addison Wesley, 2003.
-
(2003)
Program Security
, pp. 869-921
-
-
Bishop, M.1
-
29
-
-
2342565140
-
Secure Coding: Principles and Practices
-
Chapter 4:, O'Reilly
-
M. G. Graff and K. R. Wyk, Secure Coding: Principles and Practices, Chapter 4: Implementation, pp.99-123, O'Reilly, 2003.
-
(2003)
Implementation
, pp. 99-123
-
-
Graff, M.G.1
Wyk, K.R.2
-
32
-
-
0034270432
-
Statically scanning java code: Finding security vulnerabilities
-
J. Viega, G. McGraw, T. Mutdosch, and E.W. Felten, "Statically scanning java code: Finding security vulnerabilities," IEEE Software, vol.17, no.5, pp.68-74, 2000.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 68-74
-
-
Viega, J.1
McGraw, G.2
Mutdosch, T.3
Felten, E.W.4
-
36
-
-
0003547217
-
-
2nd ed. Addison-Wesley
-
S. Oaks, Java Security, 2nd ed. Addison-Wesley, 2001.
-
(2001)
Java Security
-
-
Oaks, S.1
-
38
-
-
35348829230
-
-
Addison-Wesley
-
C. Wysopal, L. Nelson, D. D. Zovi, and E. Dustin, The Art of Software Security Testing, Addison-Wesley, 2006.
-
(2006)
The Art of Software Security Testing
-
-
Wysopal, C.1
Nelson, L.2
Zovi, D.D.3
Dustin, E.4
-
48
-
-
0029333530
-
Logical foundations of object oriented and frame based languages
-
M. Kifer, G. Lausen, and J. Wu, "Logical foundations of object oriented and frame based languages," Journal of ACM, vol.42, pp.741-843, 1995.
-
(1995)
Journal of ACM
, vol.42
, pp. 741-843
-
-
Kifer, M.1
Lausen, G.2
Wu, J.3
-
49
-
-
38549147623
-
An analysis of the security patterns landscape
-
IEEE CS
-
T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, "An analysis of the security patterns landscape," in 3rd International Workshop on Software Engineering for Secure Systems (SESS07), Proc. 29th International Conference on Software Engineering Workshops (ICSEW'07), IEEE CS, 2007.
-
(2007)
3rd International Workshop on Software Engineering for Secure Systems (SESS07), Proc. 29th International Conference on Software Engineering Workshops (ICSEW'07)
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
50
-
-
33645586196
-
Using security patterns to model and analyze security requirements
-
S. Konrad, B. H. C. Cheng, L. A. Campbell, and R. Wassermann, "Using security patterns to model and analyze security requirements," in International Workshop on Requirements for High Assurance Systems, 2003.
-
(2003)
International Workshop on Requirements for High Assurance Systems
-
-
Konrad, S.1
Cheng, B.H.C.2
Campbell, L.A.3
Wassermann, R.4
-
51
-
-
77954096401
-
Security patterns related to security requirements
-
D. G. Rosado, C. Gutierrez, Eduardo Fernandez-Medina, and M. Piattini, "Security patterns related to security requirements," in Proc. 4th International Workshop on Security in Information Systems (WOSIS), 2006.
-
(2006)
Proc. 4th International Workshop on Security in Information Systems (WOSIS)
-
-
Rosado, D.G.1
Gutierrez, C.2
Fernandez-Medina, E.3
Piattini, M.4
-
52
-
-
34547107609
-
Organizing security patterns
-
M. Hafiz, P. Adamczyk, and R.E. Johnson, "Organizing security patterns," IEEE Software, vol.24, no.4, pp.52-60, 2007.
-
(2007)
IEEE Software
, vol.24
, Issue.4
, pp. 52-60
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.E.3
-
53
-
-
42449118455
-
-
Commission of European Communities, Information technology security evaluation criteria, version 1.2, 1991
-
Commission of European Communities, Information technology security evaluation criteria, version 1.2, 1991.
-
-
-
-
54
-
-
0001134191
-
A framework for information systems architecture
-
J. A. Zachman, "A framework for information systems architecture," IBM Systems Journal, vol.26, no.3, 1987.
-
(1987)
IBM Systems Journal
, vol.26
, Issue.3
-
-
Zachman, J.A.1
-
57
-
-
33644971510
-
Extracting relations among embedded software design patterns
-
A. Kubo, H. Washizaki, A. Takasu, and Y. Fukazawa, "Extracting relations among embedded software design patterns," Journal of Design & Process Science, vol.9, no.3, pp.39-52, 2005.
-
(2005)
Journal of Design & Process Science
, vol.9
, Issue.3
, pp. 39-52
-
-
Kubo, A.1
Washizaki, H.2
Takasu, A.3
Fukazawa, Y.4
-
58
-
-
38549112088
-
An inventory of security patterns,
-
Technical Report CW-469, Katholieke Universiteit Leuven, Department of Computer Science
-
K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, "An inventory of security patterns," in Technical Report CW-469, Katholieke Universiteit Leuven, Department of Computer Science, 2006.
-
(2006)
-
-
Yskout, K.1
Heyman, T.2
Scandariato, R.3
Joosen, W.4
-
59
-
-
42449084135
-
-
Microsoft, Patternshare; http://patternshare.org/.
-
Microsoft, Patternshare; http://patternshare.org/.
-
-
-
-
60
-
-
84871420984
-
-
Cunningham & Cunningham, Inc
-
Cunningham & Cunningham, Inc., Portland pattern repository; http://c2.com/ppr/.
-
Portland pattern repository
-
-
-
63
-
-
84899175349
-
-
Chapter V: A methodology to develop secure systems using patterns, Idea Group Publishing
-
E. B. Fernandez, M.M. Larrondo-Petrie, T, Sorgente, and M. VanHilst. Integrating Security and Software Engineering: Advances and Future Vision, Chapter V: A methodology to develop secure systems using patterns, pages 107-126, Idea Group Publishing, 2006.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
66
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
I. Ray, R. France, N. Li, and G. Georg, "An aspect-based approach to modeling access control concerns," Information and Software Technology, vol.46, no.9, pp.575-587, 2004.
-
(2004)
Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.2
Li, N.3
Georg, G.4
-
68
-
-
24344438696
-
Secure software development by example
-
A. Apvrille and M. Pourzandi, "Secure software development by example," IEEE Security & Privacy, vol.3, no.4, pp.10-17, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 10-17
-
-
Apvrille, A.1
Pourzandi, M.2
-
69
-
-
23844500788
-
Defect frequency and design patterns: An empirical study of industrial code
-
M. Vokac, "Defect frequency and design patterns: an empirical study of industrial code," Transactions on Software Engineering, vol.30, no.12, pp.904-917, 2004.
-
(2004)
Transactions on Software Engineering
, vol.30
, Issue.12
, pp. 904-917
-
-
Vokac, M.1
-
70
-
-
17044370046
-
Analysing security threats and vulnerabilities using abuse frames,
-
No:2003/10, 2003. Abuse Frame
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett, "Analysing security threats and vulnerabilities using abuse frames," Open University Technical Report No:2003/10, 2003. Abuse Frame.
-
Open University Technical Report
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
71
-
-
84948972584
-
Security requirements engineering: When anti-requirements hit the fan
-
R. Crook, D. Ince, L. Lin, and B. Nuseibeh, "Security requirements engineering: When anti-requirements hit the fan," in Proceeding of the 10th Requirements Engineering Conference (RE'02), pp.9-13, 2002.
-
(2002)
Proceeding of the 10th Requirements Engineering Conference (RE'02)
, pp. 9-13
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
72
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
Proc. of iTrust'04, Springer-Verlag
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements engineering meets trust management: Model, methodology, and reasoning," in Proc. of iTrust'04, LNCS 2995, pp.176-190, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
73
-
-
3042647673
-
Misuse and abuse cases: Getting past the positive
-
P. Hope, G. McGraw, and A.I. Anton, "Misuse and abuse cases: Getting past the positive," IEEE Security & Privacy, vol.2, no.3, pp.90-92, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 90-92
-
-
Hope, P.1
McGraw, G.2
Anton, A.I.3
-
74
-
-
33845264120
-
Defining security requirements through misuse actions
-
E. B. Fernandez, M. VanHilst, M.M. Larrondo, and S. Huang, "Defining security requirements through misuse actions," in IFIP International Federation for Information Processing, pp.123-137, 2006.
-
(2006)
IFIP International Federation for Information Processing
, pp. 123-137
-
-
Fernandez, E.B.1
VanHilst, M.2
Larrondo, M.M.3
Huang, S.4
-
75
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
T. Lodderstedt, D. A. Basin, and J. Doser, "SecureUML: A UML-based modeling language for model-driven security," in Proceedings of the 5th International Conference on The Unified Modeling Language, pp.426-441, 2002.
-
(2002)
Proceedings of the 5th International Conference on The Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
76
-
-
17744383167
-
Security patterns: A method for constructing secure and efficient inter-company coordination systems
-
N. Yoshioka, S. Honiden, and A. Finkelstein, "Security patterns: a method for constructing secure and efficient inter-company coordination systems," in Proceedings of Enterprise Distributed Object Computing Conference 2004 (EDOC'04), pp.84-97, 2004.
-
(2004)
Proceedings of Enterprise Distributed Object Computing Conference 2004 (EDOC'04)
, pp. 84-97
-
-
Yoshioka, N.1
Honiden, S.2
Finkelstein, A.3
|