메뉴 건너뛰기




Volumn , Issue , 2006, Pages 127-141

Modelling security patterns using NFR analysis

Author keywords

[No Author keywords available]

Indexed keywords


EID: 58049175181     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-147-6.ch006     Document Type: Chapter
Times cited : (9)

References (21)
  • 3
    • 0038284884 scopus 로고    scopus 로고
    • Introduction to the user requirements notation: Learning by example
    • Amyot, D. (2003). Introduction to the user requirements notation: Learning by example. Computer Networks, 42(3), 285-301.
    • (2003) Computer Networks , vol.42 , Issue.3 , pp. 285-301
    • Amyot, D.1
  • 4
    • 84907070662 scopus 로고    scopus 로고
    • Linking non-functional requirements and patterns
    • Retrieved November 2005, from
    • Araujo, I., & Weiss, M. (2002). Linking non-functional requirements and patterns. Conference on Pattern Languages of Programs (PLoP). Retrieved November 2005, from jerry.cs.uiuc.edu/~plop/plop2002
    • (2002) Conference On Pattern Languages of Programs (PLoP)
    • Araujo, I.1    Weiss, M.2
  • 5
    • 0037410101 scopus 로고    scopus 로고
    • Developing adaptable software architectures using design patterns: An NFR approach
    • Chung, L., Cooper, K., & Yi, A. (2003). Developing adaptable software architectures using design patterns: An NFR approach. Computer Standards & Interfaces, 25, 253-260.
    • (2003) Computer Standards & Interfaces , vol.25 , pp. 253-260
    • Chung, L.1    Cooper, K.2    Yi, A.3
  • 7
    • 0007890263 scopus 로고    scopus 로고
    • SIGS. Retrieved November 2005, from
    • Coplien, J. (1996). Software patterns. SIGS. Retrieved November 2005, from http://users.rcn.com/jcoplien/Patterns/WhitePaper/SoftwarePatterns.pdf
    • (1996) Software Patterns
    • Coplien, J.1
  • 8
    • 33744905133 scopus 로고    scopus 로고
    • A pattern language for security models
    • Retrieved November 2005, from
    • Fernandez, E., & Pan, R. (2001). A pattern language for security models. Conference on Pattern Languages of Programs (PLoP). Retrieved November 2005, from http://jerry.cs.uiuc.edu/~plop/plop2001
    • (2001) Conference On Pattern Languages of Programs (PLoP)
    • Fernandez, E.1    Pan, R.2
  • 10
    • 84899356620 scopus 로고    scopus 로고
    • GRL, Retrieved November 2005, from
    • GRL. (2005). Retrieved November 2005, from http://www.cs.toronto.edu/km/GRL
    • (2005)
  • 11
    • 0003026194 scopus 로고    scopus 로고
    • From non-functional requirements to design through patterns
    • Gross, D., & Yu, E. (2001). From non-functional requirements to design through patterns. Requirements Engineering, 6(1), 18-36.
    • (2001) Requirements Engineering , vol.6 , Issue.1 , pp. 18-36
    • Gross, D.1    Yu, E.2
  • 12
    • 84899202157 scopus 로고    scopus 로고
    • Microsoft, Retrieved November 2005, from
    • Microsoft. (2005). Security engineering explained. Retrieved November 2005, from http://msdn.microsoft.com/library/en-us/dnpag2/html/SecEngExplained.asp
    • (2005) Security Engineering Explained
  • 13
    • 33646184981 scopus 로고    scopus 로고
    • Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
    • LNCS 3716. Springer
    • Mouratidis, H., Weiss, M., & Giorgini, P. (2005). Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems. Conceptual Modeling (ER) (pp. 225-240). LNCS 3716. Springer.
    • (2005) Conceptual Modeling (ER) , pp. 225-240
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 14
    • 77957949696 scopus 로고    scopus 로고
    • Rewriting a pattern language to make it more expressive
    • Retrieved November 2005, from
    • Ong, H., & Weiss, M. (2003). Rewriting a pattern language to make it more expressive. Hot Topic on the Expressiveness of Pattern Languages, ChiliPLoP. Retrieved November 2005, from http://www.scs.carleton.ca/~weiss/patterns/expressive/chiliplop03
    • (2003) Hot Topic On the Expressiveness of Pattern Languages, ChiliPLoP
    • Ong, H.1    Weiss, M.2
  • 17
    • 47849084790 scopus 로고    scopus 로고
    • Technical Report, MSU CSE-03-23, Michigan State University
    • Wassermann, R., & Cheng, B. (2003). Security patterns. Technical Report, MSU CSE-03-23, Michigan State University.
    • (2003) Security Patterns
    • Wassermann, R.1    Cheng, B.2
  • 19
    • 34548122074 scopus 로고    scopus 로고
    • Architectural patterns for application security
    • Retrieved November 2005, from
    • Yoder, J., & Barcalow (1997). Architectural patterns for application security. Conference on Pattern Languages of Programs (PLoP). Retrieved November 2005, from http://jerry.cs.uiuc.edu/plop/plop97.
    • (1997) Conference On Pattern Languages of Programs (PLoP)
    • Yoder, J.1    Barcalow2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.