-
1
-
-
84901351508
-
Software Engineering Techniques Applied to AmI: Security Patterns
-
Springer, Sept
-
Francisco Sanchez-Cid, Antonio Muñoz, Daniel Serrano, and M.C. Gago, "Software Engineering Techniques Applied to AmI: Security Patterns". In Proceedings of the First International Conference on Ambient Intelligence Developments, Springer, Sept. 2006, pp. 108-124.
-
(2006)
Proceedings of the First International Conference on Ambient Intelligence Developments
, pp. 108-124
-
-
Sanchez-Cid, F.1
Muñoz, A.2
Serrano, D.3
Gago, M.C.4
-
2
-
-
0037343253
-
Adding Roles to CORBA Objects
-
Mar
-
C. Canal, L. Fuentes, E. Pimentel, J.M. Troya, and A. Vallecillo, "Adding Roles to CORBA Objects", IEEE Transactions on Software Engineering 29(3), Mar. 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.3
-
-
Canal, C.1
Fuentes, L.2
Pimentel, E.3
Troya, J.M.4
Vallecillo, A.5
-
5
-
-
47849105197
-
-
Konrad, S., B.H.C. Cheng, Campbell, Laura. A., and Wassermann R., Using Security Patterns to Model and Analyze Security Requirements, Proc. Requirements for High Assurance Systems Workshop, 2003.
-
Konrad, S., B.H.C. Cheng, Campbell, Laura. A., and Wassermann R., "Using Security Patterns to Model and Analyze Security Requirements", Proc. Requirements for High Assurance Systems Workshop, 2003.
-
-
-
-
6
-
-
42549105354
-
Design patterns: Elements of Reusable Object-Oriented Software
-
Gamma, E., Helm, R., Johnson, R., and Vlissides, J., "Design patterns: Elements of Reusable Object-Oriented Software", Addison-Wesley, 1994.
-
(1994)
Addison-Wesley
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
9
-
-
47849084790
-
Security Patterns
-
Technical Report MSU-CSE-03-23, Aug
-
R. Wassermann, and B.H.C. Cheng, "Security Patterns" Technical Report MSU-CSE-03-23, Aug. 2003.
-
(2003)
-
-
Wassermann, R.1
Cheng, B.H.C.2
-
10
-
-
12744277616
-
Architectural Patterns for Enabling Application Security
-
Reading, MA: Addison Wesley Publishing Company
-
Yoder, J. and Barcalow, J., "Architectural Patterns for Enabling Application Security", Pattern Languages of Program Design, Reading, MA: Addison Wesley Publishing Company, 2000, pp. 301-336.
-
(2000)
Pattern Languages of Program Design
, pp. 301-336
-
-
Yoder, J.1
Barcalow, J.2
-
11
-
-
47849123445
-
Monitoring Design Pattern Contracts
-
Hallstrom, J. O., Soundarajan, N., and Tyler, B., "Monitoring Design Pattern Contracts", In Proc. of the FSE-12 Workshop on Specification and Verification of Component-Based Systems, 2004, pp. 87-94.
-
(2004)
Proc. of the FSE-12 Workshop on Specification and Verification of Component-Based Systems
, pp. 87-94
-
-
Hallstrom, J.O.1
Soundarajan, N.2
Tyler, B.3
-
13
-
-
41649113549
-
-
Hallstrom, J. O., and Soundarajan, N., Pattern-Based System Evolution: A Case-Study, In the Proc of the 18th International Conference on Software Engineering and Knowledge Engineering, 2006.
-
Hallstrom, J. O., and Soundarajan, N., "Pattern-Based System Evolution: A Case-Study", In the Proc of the 18th International Conference on Software Engineering and Knowledge Engineering, 2006.
-
-
-
-
14
-
-
0031597155
-
Formalizing design patterns
-
IEEE Computer Society Press
-
Mikkonen, T., "Formalizing design patterns". In Proc. of 20th ICSE, IEEE Computer Society Press, 1998, pp. 115-124.
-
(1998)
Proc. of 20th ICSE
, pp. 115-124
-
-
Mikkonen, T.1
|