-
1
-
-
34250666806
-
Security patterns
-
Fernandez, E.B., "Security patterns," in Procs. 8th International Symposium on System and Information Security - SSI'2006, Keynote talk, Sao Jose dos Campos, Brazil, November 08-10, 2006.
-
Procs. 8th International Symposium on System and Information Security - SSI'2006, Keynote Talk, Sao Jose Dos Campos, Brazil, November 08-10, 2006
-
-
Fernandez, E.B.1
-
2
-
-
33750050331
-
-
John Wiley & Sons, Inc.
-
Schumacher, M., E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Inc., 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
3
-
-
84899175349
-
A methodology to develop secure systems using patterns, Chapter 5
-
H. Mouratidis and P. Giorgini (Eds.), IDEA Press
-
Fernandez, E. B., M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst. A methodology to develop secure systems using patterns, Chapter 5 in "Integrating security and software engineering: Advances and future vision", H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107-126.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Vanhilst, M.4
-
4
-
-
58849164843
-
Security for process control systems: An overview
-
Nov.-Dec.
-
Braendle, M. and M. Naedele. Security for process control systems: An overview. IEEE Security & Privacy, Vol. 6, No 6, Nov.-Dec. 2008 pp.24-29
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.6
, pp. 24-29
-
-
Braendle, M.1
Naedele, M.2
-
6
-
-
33750405289
-
Security issues in SCADA networks
-
Igure, V. M., S. A. Laughter, and R. D. Williams. Security issues in SCADA networks. Computers & Security, 25(7):498-506, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
7
-
-
0003880013
-
-
Addison-Wesley
-
Gamma, E., R. Helm,R. Johnson, and J. Vlissides, Design patterns - Elements of reusable object-oriented software, Addison-Wesley 1994.
-
(1994)
Design Patterns - Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
8
-
-
22344444992
-
The myths and facts behind cyber security risks for industrial control systems
-
Byres, E. and J. Lowe, "The myths and facts behind cyber security risks for industrial control systems," in Proc. of VDE Congress, 2004.
-
Proc. of VDE Congress, 2004
-
-
Byres, E.1
Lowe, J.2
-
9
-
-
33845264120
-
Defining security requirements through misuse actions
-
DOI 10.1007/978-0-387-34831-5-10, Advances Software Engineering: Expanding the Frontiers of Software Technology: IFIP 19th World Computer Congress, First International Workshop on Advanced Software Engineering, Augst 2, Santiago, Chil
-
Fernandez, E. B. M. VanHilst, M. M. Larrondo-Petrie, and S. Huang, "Defining security requirements through misuse actions," in Advanced Software Engineering: Expanding the Frontiers of Software Technology, 219:123-137, 2006. (Pubitemid 44856848)
-
(2006)
IFIP International Federation for Information Processing
, vol.219
, pp. 123-137
-
-
Fernandez, E.B.1
Vanhilst, M.2
Petrie, M.M.L.3
Huang, S.4
-
10
-
-
33744905133
-
A pattern language for security models
-
Fernandez, E B. and R.Y. Pan, "A pattern language for security models," in Procs. of PLoP 2001, http://jerry.cs.uiuc.edu/~plop/plop2001/ accepted-submissions/accepted-papers.html
-
Procs. of PLoP 2001
-
-
Fernandez, E.B.1
Pan, R.Y.2
-
11
-
-
84892902868
-
A pattern system for access controll
-
Priebe, T. E., B. Fernandez, J. I. Mehlau, and G. Pernul. "A pattern system for access controll," in Proc. of the 18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2004.
-
Proc. of the 18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2004
-
-
Priebe, T.E.1
Fernandez, B.2
Mehlau, J.I.3
Pernul, G.4
-
13
-
-
77951721388
-
Tropyc: A pattern language for cryptographic object-oriented software
-
Addison Wesley Publishing Company, Also in
-
"Tropyc: A pattern language for cryptographic object-oriented software". Addison Wesley Publishing Company, 1999. Also in Proc. of PLoP, 1998.
-
(1999)
Proc. of PLoP, 1998
-
-
-
15
-
-
27644559364
-
Trends in process control systems security
-
DOI 10.1109/MSP.2005.136
-
Miller, A., "Trends in process control systems security," IEEE Security and Privacy, 3(5):57-60, 2005. (Pubitemid 41560446)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 57-60
-
-
Miller, A.1
-
16
-
-
77951703620
-
21 steps to improve cyber security of SCADA networks
-
U.S. Department Of Energy. September 9
-
U.S. Department Of Energy. "21 steps to improve cyber security of SCADA networks. U.S. DoE Report. September 9, 2002. http://www.oe.netl.doe.gov/ docs/prepare/21stepsbooklet.pdf
-
(2002)
U.S. DoE Report
-
-
-
17
-
-
70549106029
-
Electricity grid in U.S. penetrated by spies
-
April 8
-
Gorman, S., "Electricity grid in U.S. penetrated by spies," in The Wall Street Journal Online, April 8, 2009. http://online.wsj.com/article/ SB123914805204099085.html?mod=goog
-
(2009)
The Wall Street Journal Online
-
-
Gorman, S.1
-
18
-
-
77951763085
-
Security patterns for physical access control systems
-
Fernandez, E. B., J. Ballesteros, A. C. Desouza-Doucet, and M. M. Larrondo-Petrie. "Security patterns for physical access control systems," in Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2007.
-
Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2007
-
-
Fernandez, E.B.1
Ballesteros, J.2
Desouza-Doucet, A.C.3
Larrondo-Petrie, M.M.4
-
19
-
-
77951756615
-
An extended reference monitor for security and safety
-
to appear in
-
Fernandez, E.B., M. VanHilst, D. laRed M., and S. Mujica, "An extended reference monitor for security and safety," to appear in Procs. 5th Iberoamerican Conference on Information Security (CIBSI 2009). Montevideo, Uruguay, November 2009.
-
Procs. 5th Iberoamerican Conference on Information Security (CIBSI 2009). Montevideo, Uruguay, November 2009
-
-
Fernandez, E.B.1
VanHilst, M.2
LaRed M, D.3
Mujica, S.4
|