-
1
-
-
33751052258
-
Multiple design patterns for Voice over IP (VoIP) security
-
Phoenix, AZ
-
Z. Anwar, W. Yurcik, R. Johnson, M. Hafiz and R. Campbell, Multiple design patterns for Voice over IP (VoIP) security, Procs. of the IEEE Workshop on Information Assurance (WIA 2006), Phoenix, AZ, 2006.
-
(2006)
Procs. of the IEEE Workshop on Information Assurance (WIA
-
-
Anwar, Z.1
Yurcik, W.2
Johnson, R.3
Hafiz, M.4
Campbell, R.5
-
3
-
-
70349700822
-
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, 1, Wiley, 1996.
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, Volume 1, Wiley, 1996.
-
-
-
-
4
-
-
84869630846
-
-
CERT Coordination Center. Carnegie Mellon University, http://www.cert.org/, 2006.
-
(2006)
-
-
-
5
-
-
33845264120
-
Defining Security Requirements through Misuse Actions
-
Springer, pp
-
E. B. Fernandez, M. VanHilst, M. M. Larrondo Petrie, S. Huang, Defining Security Requirements through Misuse Actions, in Advanced Software Engineering: Expanding the Frontiers of Software Technology, International Federation for Information Processing, Springer, pp.123-137, 2006.
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology, International Federation for Information Processing
, pp. 123-137
-
-
Fernandez, E.B.1
VanHilst, M.2
Larrondo Petrie, M.M.3
Huang, S.4
-
6
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
Chapter 5, IDEA Press, pp
-
E. B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, A methodology to develop secure systems using patterns, Chapter 5 in Integrating security and software engineering: Advances and future vision, IDEA Press, pp.107-126, 2006.
-
(2006)
Integrating security and software engineering: Advances and future vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
7
-
-
36448967526
-
Attack patterns: A new forensic and design tool
-
E.B. Fernandez, J.C. Pelaez, and M.M. Larrondo-Petrie, Attack patterns: A new forensic and design tool, Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Springer/IFIP, pp.345-357, 2007.
-
(2007)
Procs. of the Third Annual IFIP WG 11.9 Int. Conf. on Digital Forensics, Springer/IFIP
, pp. 345-357
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
8
-
-
0003880013
-
-
Addison-Wesley, Boston, Mass
-
E. Gamma, R. Helm, R. Johnson, J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, Boston, Mass., 1994.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
11
-
-
0028495490
-
Requirements specification for process control systems
-
IEEE Computer Society Press, pp
-
N. G. Leveson, M.P.E. Heimdahl, H. Hildreth, and J.D. Reese, Requirements specification for process control systems, IEEE Transactions on Software Engineering, Vol. 20, No 9, IEEE Computer Society Press, pp.684-707, 1994.
-
(1994)
IEEE Transactions on Software Engineering
, vol.20
, Issue.9
, pp. 684-707
-
-
Leveson, N.G.1
Heimdahl, M.P.E.2
Hildreth, H.3
Reese, J.D.4
-
13
-
-
70349721021
-
-
A.P. Moore, R.J. Ellison, and R.C. Linger, Attack modeling for information security and survability. Tech. Note CMU/SEI-2001-TN-001, 2001.
-
A.P. Moore, R.J. Ellison, and R.C. Linger, Attack modeling for information security and survability. Tech. Note CMU/SEI-2001-TN-001, 2001.
-
-
-
-
16
-
-
68149150966
-
Attack patterns in VoIP
-
J. C. Pelaez, E.B.Fernandez, M.M. Larrondo-Petrie, and C. Wieser, Attack patterns in VoIP, Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007), 2007.
-
(2007)
Procs. of the 14th Pattern Languages of Programs Conference (PLoP2007)
-
-
Pelaez, J.C.1
Fernandez, E.B.2
Larrondo-Petrie, M.M.3
Wieser, C.4
-
17
-
-
33750050331
-
-
Wiley
-
M. Schumacher, E.B.Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering, Wiley, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
19
-
-
70349713146
-
A development method based on security patterns
-
N. Yoshioka, A development method based on security patterns, Presentation, NII, Tokyo, Japan, 03/29/06, 2006.
-
(2006)
Presentation, NII, Tokyo, Japan, 03/29/06
-
-
Yoshioka, N.1
-
21
-
-
42449139876
-
-
National Institute of Informatics
-
N. Yoshioka, H. Washizaki, and K. Maruyama, A Survey on Security Patterns, Progress in Informatics, National Institute of Informatics, No.5, pp.35-47, 2008.
-
(2008)
A Survey on Security Patterns, Progress in Informatics
, Issue.5
, pp. 35-47
-
-
Yoshioka, N.1
Washizaki, H.2
Maruyama, K.3
-
22
-
-
70349708402
-
-
submitted
-
H. Washizaki, E. B. Fernandez, H. Maruyama, A. Kubo, and N. Yoshioka, Precise classification of software patterns, 2008(submitted).
-
(2008)
Precise classification of software patterns
-
-
Washizaki, H.1
Fernandez, E.B.2
Maruyama, H.3
Kubo, A.4
Yoshioka, N.5
-
25
-
-
33750490069
-
-
Prentice Hall
-
C. Steel, R. Nagappan, and R. Lai, Core Security Patterns: Best Strategies for J2EE, Web Services, and Identity anagement, Prentice Hall, 2005.
-
(2005)
Core Security Patterns: Best Strategies for J2EE, Web Services, and Identity anagement
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
|