-
1
-
-
84871806446
-
-
Common Criteria, http://www.commoncriteriaportal.org/
-
Common Criteria
-
-
-
2
-
-
33746393691
-
-
The Open Group, UK, April
-
Blakley, B., Heath, C., members of The Open Group Security Forum: Technical Guide: Security Design Patterns. The Open Group, UK, April 2004.
-
(2004)
members of The Open Group Security Forum: Technical Guide: Security Design Patterns
-
-
Blakley, B.1
Heath, C.2
-
3
-
-
47849088955
-
Patterns for the extensible Access Control Markup Language
-
Monticello, Illinois, USA
-
Delessy, N., Fernandez, E.B.: Patterns for the extensible Access Control Markup Language. Proc. 12th Pattern Languages of Programs Conference, Monticello, Illinois, USA, (2005) http://hillside.net/plop/2005/proceedings/
-
(2005)
Proc. 12th Pattern Languages of Programs Conference
-
-
Delessy, N.1
Fernandez, E.B.2
-
5
-
-
84899175349
-
A Methodology to Develop Secure Systems Using Patterns
-
Mouratidis, H, Giorgini, P, Eds, IDEA Press
-
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: A Methodology to Develop Secure Systems Using Patterns. In: Mouratidis, H., Giorgini, P. (Eds.): Integrating Security and Software Engineering: Advances and Future Vision. IDEA Press (2006) 107-126
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
6
-
-
33845264120
-
Defining Security Requirements through Misuse Actions
-
Ochoa, S.F, Roman, G.-C, Eds, Springer
-
Fernandez, E.B., VanHilst, M., Larrondo Petrie, M.M., Huang, S.: Defining Security Requirements through Misuse Actions. In: Ochoa, S.F., Roman, G.-C. (Eds.): Advanced Software Engineering: Expanding the Frontiers of Software Technology, International Federation for Information Processing, Springer (2006) 123-137
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology, International Federation for Information Processing
, pp. 123-137
-
-
Fernandez, E.B.1
VanHilst, M.2
Larrondo Petrie, M.M.3
Huang, S.4
-
8
-
-
85015412246
-
Classifying Security Patterns
-
Shenyang, China, April 26-28
-
Fernandez, E.B., Washizaki, H., Yoshioka, N., Kubo, A., Fukazawa, Y.: Classifying Security Patterns. Proc. 10th Asia-Pacific Web Conference, Shenyang, China, April 26-28 (2008)
-
(2008)
Proc. 10th Asia-Pacific Web Conference
-
-
Fernandez, E.B.1
Washizaki, H.2
Yoshioka, N.3
Kubo, A.4
Fukazawa, Y.5
-
10
-
-
58049143447
-
-
Federal Information Security Management Act FISMA, March 18
-
Federal Information Security Management Act (FISMA), March 18, 2007, http://iase.disa.mil/fisma/index.html
-
(2007)
-
-
-
11
-
-
58049188477
-
-
Senate Banking Committee:, November 1 1999
-
Senate Banking Committee: Gramm-Leach-Bliley Act, Monday, November 1 (1999) http://www.senate.gov/~banking/conf/fincon.pdf
-
Gramm-Leach-Bliley Act, Monday
-
-
-
12
-
-
34547107609
-
Organizing Security Patterns
-
July/August
-
Hafiz, M., Adamczyk, P., Johnson, R.E.: Organizing Security Patterns. IEEE Software, 24(4), July/August (2007) 52-60
-
(2007)
IEEE Software
, vol.24
, Issue.4
, pp. 52-60
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.E.3
-
13
-
-
58049170031
-
-
United States Department of Health and Human Services, Office of Civil Rights: Health Insurance Portability and Accountability Act of 1996. http://www.hhs.gov/ocr/hipaa/
-
United States Department of Health and Human Services, Office of Civil Rights: Health Insurance Portability and Accountability Act of 1996. http://www.hhs.gov/ocr/hipaa/
-
-
-
-
17
-
-
1342344540
-
A New Accident Model for Engineering Safer Systems
-
April
-
Leveson, N.: A New Accident Model for Engineering Safer Systems. Safety Science, 42(4), April (2004) 237-270
-
(2004)
Safety Science
, vol.42
, Issue.4
, pp. 237-270
-
-
Leveson, N.1
-
20
-
-
29744447253
-
Business-Driven Application Security: From Modeling to Managing Secure Applications
-
Nagaratnam, N., Nadalin, A., Hondo, M., McIntosh, M., Austel, P.: Business-Driven Application Security: from Modeling to Managing Secure Applications. IBM Systems Journal, 44(4) (2005) 847-867
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
, pp. 847-867
-
-
Nagaratnam, N.1
Nadalin, A.2
Hondo, M.3
McIntosh, M.4
Austel, P.5
-
21
-
-
58049179760
-
-
The OWASP Testing Project
-
The OWASP Testing Project. http://www.modsecurity.org/archive/ OWASPTesting-PhaseOne.pdf
-
-
-
-
23
-
-
58049165829
-
Attack Patterns in VoIP
-
Monticello, Illinois, USA
-
Pelaez, J.C., Fernandez, E.B., Larrondo-Petrie, M.M., Wieser, C.: Attack Patterns in VoIP. Proc. 14th Pattern Languages of Programs Conference, Monticello, Illinois, USA, (2007)
-
(2007)
Proc. 14th Pattern Languages of Programs Conference
-
-
Pelaez, J.C.1
Fernandez, E.B.2
Larrondo-Petrie, M.M.3
Wieser, C.4
-
24
-
-
58049142719
-
-
One Hundred Seventh Congress of the United States of America: Sarbanes-Oxley Act of 2002. http://news.findlaw.com/hdocs/docs/gwbush/ sarbanesoxley072302.pdf
-
One Hundred Seventh Congress of the United States of America: Sarbanes-Oxley Act of 2002. http://news.findlaw.com/hdocs/docs/gwbush/ sarbanesoxley072302.pdf
-
-
-
-
25
-
-
34547352108
-
Towards Security at All Stages of a System's Life Cycle
-
Schumacher, M., Ackermann, R., Steinmetz, R.: Towards Security at All Stages of a System's Life Cycle. Proc. Int. Conf. on Software, Telecommunications, and Computer Networks (2000) 11-19
-
(2000)
Proc. Int. Conf. on Software, Telecommunications, and Computer Networks
, pp. 11-19
-
-
Schumacher, M.1
Ackermann, R.2
Steinmetz, R.3
-
27
-
-
33750050331
-
-
Wiley
-
Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley (2006)
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
28
-
-
33750490069
-
-
Prentice Hall
-
Steel, C., Nagappan, R., Lai, R.: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Prentice Hall (2005)
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
30
-
-
33750263592
-
-
Trowbridge, D., Cunningham, W., Evans, M., Brader, L., Describing the Enterprise Architectural Space. MSDN (2004) http://msdn2.microsoft.com/en-us/ library/ms978655.aspx
-
(2004)
Describing the Enterprise Architectural Space. MSDN
-
-
Trowbridge, D.1
Cunningham, W.2
Evans, M.3
Brader, L.4
|