-
3
-
-
0038284884
-
Introduction to the user requirements notation: Learning by example
-
Amyot, D. (2003). Introduction to the user requirements notation: Learning by example. Computer Networks, 42(3), 285-301.
-
(2003)
Computer Networks
, vol.42
, Issue.3
, pp. 285-301
-
-
Amyot, D.1
-
4
-
-
84907070662
-
Linking non-functional requirements and patterns
-
Retrieved November 2005, from
-
Araujo, I., & Weiss, M. (2002). Linking non-functional requirements and patterns. Conference on Pattern Languages of Programs (PLoP). Retrieved November 2005, from jerry.cs.uiuc.edu/~plop/plop2002
-
(2002)
Conference On Pattern Languages of Programs (PLoP)
-
-
Araujo, I.1
Weiss, M.2
-
5
-
-
0037410101
-
Developing adaptable software architectures using design patterns: An NFR approach
-
Chung, L., Cooper, K., & Yi, A. (2003). Developing adaptable software architectures using design patterns: An NFR approach. Computer Standards & Interfaces, 25, 253-260.
-
(2003)
Computer Standards & Interfaces
, vol.25
, pp. 253-260
-
-
Chung, L.1
Cooper, K.2
Yi, A.3
-
6
-
-
0003696305
-
-
Kluwer Academic Publishers
-
Chung, L., Nixon, B., Yu, E., & Mylopoulos, J. (2000). Non-functional requirements in software engineering. Kluwer Academic Publishers.
-
(2000)
Non-functional Requirements In Software Engineering
-
-
Chung, L.1
Nixon, B.2
Yu, E.3
Mylopoulos, J.4
-
7
-
-
0007890263
-
-
SIGS. Retrieved November 2005, from
-
Coplien, J. (1996). Software patterns. SIGS. Retrieved November 2005, from http://users.rcn.com/jcoplien/Patterns/WhitePaper/SoftwarePatterns.pdf
-
(1996)
Software Patterns
-
-
Coplien, J.1
-
9
-
-
0003880013
-
-
Addison-Wesley
-
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object-oriented software. Addison-Wesley.
-
(1994)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
10
-
-
84899356620
-
-
GRL, Retrieved November 2005, from
-
GRL. (2005). Retrieved November 2005, from http://www.cs.toronto.edu/km/GRL
-
(2005)
-
-
-
11
-
-
0003026194
-
From non-functional requirements to design through patterns
-
Gross, D., & Yu, E. (2001). From non-functional requirements to design through patterns. Requirements Engineering, 6(1), 18-36.
-
(2001)
Requirements Engineering
, vol.6
, Issue.1
, pp. 18-36
-
-
Gross, D.1
Yu, E.2
-
12
-
-
84899202157
-
-
Microsoft, Retrieved November 2005, from
-
Microsoft. (2005). Security engineering explained. Retrieved November 2005, from http://msdn.microsoft.com/library/en-us/dnpag2/html/SecEngExplained.asp
-
(2005)
Security Engineering Explained
-
-
-
13
-
-
33646184981
-
Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
-
LNCS 3716. Springer
-
Mouratidis, H., Weiss, M., & Giorgini, P. (2005). Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems. Conceptual Modeling (ER) (pp. 225-240). LNCS 3716. Springer.
-
(2005)
Conceptual Modeling (ER)
, pp. 225-240
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
14
-
-
77957949696
-
Rewriting a pattern language to make it more expressive
-
Retrieved November 2005, from
-
Ong, H., & Weiss, M. (2003). Rewriting a pattern language to make it more expressive. Hot Topic on the Expressiveness of Pattern Languages, ChiliPLoP. Retrieved November 2005, from http://www.scs.carleton.ca/~weiss/patterns/expressive/chiliplop03
-
(2003)
Hot Topic On the Expressiveness of Pattern Languages, ChiliPLoP
-
-
Ong, H.1
Weiss, M.2
-
16
-
-
33750050331
-
-
Wiley
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security patterns: Integrating security and systems engineering. Wiley.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
17
-
-
47849084790
-
-
Technical Report, MSU CSE-03-23, Michigan State University
-
Wassermann, R., & Cheng, B. (2003). Security patterns. Technical Report, MSU CSE-03-23, Michigan State University.
-
(2003)
Security Patterns
-
-
Wassermann, R.1
Cheng, B.2
-
19
-
-
34548122074
-
Architectural patterns for application security
-
Retrieved November 2005, from
-
Yoder, J., & Barcalow (1997). Architectural patterns for application security. Conference on Pattern Languages of Programs (PLoP). Retrieved November 2005, from http://jerry.cs.uiuc.edu/plop/plop97.
-
(1997)
Conference On Pattern Languages of Programs (PLoP)
-
-
Yoder, J.1
Barcalow2
|