-
2
-
-
57849125076
-
Eliciting security requirements through misuse activities
-
In, Los Alamitos, CA: IEEE Computer Society
-
Braz, F., Fernandez, E. B., & VanHilst, M. (2008). Eliciting security requirements through misuse activities. In Proceedings of the 19th International Workshop on Database and Expert Systems Applications (pp. 328-333). Los Alamitos, CA: IEEE Computer Society.
-
(2008)
Proceedings of the 19th International Workshop on Database and Expert Systems Applications
, pp. 328-333
-
-
Braz, F.1
Fernandez, E.B.2
Vanhilst, M.3
-
3
-
-
0004101993
-
Pattern-oriented software architecture
-
West Sussex, England: John Wiley & Sons
-
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-Oriented Software Architecture: Vol. 1. A System of Patterns. West Sussex, England: John Wiley & Sons.
-
(1996)
Vol. 1. a System of Patterns
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
4
-
-
49049090200
-
A pattern-driven security process for SOA applications
-
In, Washington DC: IEEE Computer Society
-
Delessy, N., & Fernandez, E. B. (2008). A pattern-driven security process for SOA applications. In Proceedings of the 3rd International Conference on Availability, Reliability, and Security (pp. 416-421). Washington DC: IEEE Computer Society.
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability, and Security
, pp. 416-421
-
-
Delessy, N.1
Fernandez, E.B.2
-
5
-
-
57849090099
-
Incorporating database systems into a secure software development methodology
-
In, Washington DC: IEEE Computer Society
-
Fernandez, E. B., Jürjens, J., Yoshioka, N., & Washizaki, H. (2008). Incorporating database systems into a secure software development methodology. In Proceedings of the 2008 19th International Conference on Database and Expert Systems Application (pp. 310-314). Washington DC: IEEE Computer Society.
-
(2008)
Proceedings of the 2008 19th International Conference on Database and Expert Systems Application
, pp. 310-314
-
-
Fernandez, E.B.1
Jürjens, J.2
Yoshioka, N.3
Washizaki, H.4
-
6
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
In Mouratidis, H., & Giorgini, P. (Eds.), Hershey, PA, IDEA Group
-
Fernandez, E. B., Larrondo-Petrie, M. M., Sor-gente, T., & VanHilst, M. (2006). A Methodology to Develop Secure Systems Using Patterns. In Mouratidis, H., & Giorgini, P. (Eds.), Integrating Security and Software Engineering: Advances and Future Vision (pp. 107-126). Hershey, PA: IDEA Group.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sor-Gente, T.3
Vanhilst, M.4
-
7
-
-
36448967526
-
Attack patterns: A new forensic and design tool
-
In P. Craiger & S. Shenoi (Eds.), Germany, Springer
-
Fernandez, E. B., Pelaez, J. C., & Larrondo-Petrie, M. M. (2007). Attack patterns: A new forensic and design tool. In P. Craiger & S. Shenoi (Eds.) Advances in Digital Forensics III: Proceedings of the Third Annual IFIP WG 11.9 International Conference on Digital Forensics (pp. 345-357). Berlin, Germany: Springer.
-
(2007)
Advances in Digital Forensics III: Proceedings of the Third Annual IFIP WG 11.9 International Conference on Digital Forensics
, pp. 345-357
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
8
-
-
67449107159
-
Patterns for session-based access control
-
In, Retrieved November 25, 2009, from
-
Fernandez, E. B., & Pernul, G. (2006). Patterns for session-based access control. In Proceedings of the Conference on Pattern Languages of Programs. Hillside Group. Retrieved November 25, 2009, from http://hillside.net/plop/2006/.
-
(2006)
Proceedings of the Conference on Pattern Languages of Programs. Hillside Group
-
-
Fernandez, E.B.1
Pernul, G.2
-
9
-
-
52149088970
-
Patterns and pattern diagrams for access control
-
In S. Furnell; S.K. Katsikas, & A. Lioy (Eds.), Heidelberg, Germany, Springer
-
Fernandez, E. B., Pernul, G., & Larrondo-Petrie, M. M. (2008). Patterns and pattern diagrams for access control. In S. Furnell; S.K. Katsikas, & A. Lioy (Eds.) LNCS 5185: Trust, Privacy and Security in Digital Business: 5th International Conference on Trust and Privacy in Digital Business (pp. 38-47). Heidelberg, Germany: Springer.
-
(2008)
LNCS 5185: Trust, Privacy and Security in Digital Business: 5th International Conference on Trust and Privacy in Digital Business
, pp. 38-47
-
-
Fernandez, E.B.1
Pernul, G.2
Larrondo-Petrie, M.M.3
-
10
-
-
43749110915
-
Classifying security patterns
-
In Y. Zhang, G. Yu, & E. Bertino (Eds.), Heidelberg, Germany, Springer
-
Fernandez, E. B., Washizaki, H., Yoshioka, N., Kubo, A., & Fukazawa, Y. (2008). Classifying security patterns., In Y. Zhang, G. Yu, & E. Bertino (Eds.) NCS 4976 Progress in WWW Research and Development: Proceedings of the 10th Asia-Pacific Web Conference (pp. 342-347). Heidelberg, Germany: Springer.
-
(2008)
NCS 4976 Progress in WWW Research and Development: Proceedings of the 10th Asia-Pacific Web Conference
, pp. 342
-
-
Fernandez, E.B.1
Washizaki, H.2
Yoshioka, N.3
Kubo, A.4
Fukazawa, Y.5
-
11
-
-
70349706065
-
Modeling misuse patterns
-
In, Los Alamitos, CA: IEEE Computer Society
-
Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2009a). Modeling misuse patterns. In Proceedings of the International Conference on Availability, Reliability and Security (pp. 566-571). Los Alamitos, CA: IEEE Computer Society.
-
(2009)
Proceedings of the International Conference on Availability, Reliability and Security
, pp. 566
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
-
12
-
-
84899213241
-
Security patterns and quality
-
In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.), in, conjuction with OOPSLA 2009., Retrieved November 25, 2009 from
-
Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2009b). Security patterns and quality. In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.) Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 46-47).), in conjuction with OOPSLA 2009. Retrieved November 25, 2009 from http://gracecenter.jp/downloads/GRACE-TR-2009-07.pdf.
-
(2009)
Proceedings of the Third International Workshop on Software Patterns and Quality
, pp. 46-47
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
-
13
-
-
84982782845
-
Using security patterns to build secure systems
-
Retrieved November 25, 2009, from
-
Fernandez, E. B., Yoshioka, N., Washizaki, H., & Jürjens, J. (2007). Using security patterns to build secure systems. Proceedings of the 1st International Workshop on Software Patterns and Quality, Retrieved November 25, 2009, from http://apsec2007.fuka.info.waseda.ac.jp/parts/ W3SPAQu.pdf.
-
(2007)
Proceedings of the 1st International Workshop on Software Patterns and Quality
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
Jürjens, J.4
-
15
-
-
0003880013
-
-
Reading, MA, Addison-Wesley Professional
-
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. M. (1994). Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley Professional.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.M.4
-
16
-
-
34547107609
-
Organizing security patterns
-
doi:10.1109/MS.2007.114
-
Hafiz, M., Adamczyk, P., & Johnson, R. E. (2007). Organizing security patterns. IEEE Software, 24(4), 52-60. doi:10.1109/MS.2007.114
-
(2007)
IEEE Software
, vol.24
, Issue.4
, pp. 52-60
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.E.3
-
18
-
-
67449087408
-
The credential pattern
-
In, Hillside Group. Retrieved November 25, 2009, from
-
Morrison, P., & Fernandez, E. B. (2006). The credential pattern. In Proceedings of the Conference on Pattern Languages of Programs. Hillside Group. Retrieved November 25, 2009, from http://hillside.net/plop/2006/.
-
(2006)
Proceedings of the Conference on Pattern Languages of Programs
-
-
Morrison, P.1
Fernandez, E.B.2
-
19
-
-
77952349147
-
Analysing security in information systems
-
Presented at the, Porto Portugal. Retrieved November 25, 2009, from
-
Mouratidis, H., & Giorgini, P. (2004). Analysing security in information systems. Presented at the Second International Workshop on Security in Information Systems, Porto Portugal. Retrieved November 25, 2009, from http://www.dit.unitn. it/~pgiorgio/papers/ICEISWorkshop04.pdf
-
(2004)
Second International Workshop on Security in Information Systems
-
-
Mouratidis, H.1
Giorgini, P.2
-
20
-
-
33746038490
-
Towards a comprehensive framework for secure systems development
-
Heidelberg, Germany: Springer
-
Mouratidis, H., Jùrjens, J., & Fox, J. (2006). Towards a Comprehensive Framework for Secure Systems Development. In LNCS 4001: Proceedings of the 18th Conference on Advanced Information Systems, (pp. 48-Heidelberg, Germany: Springer.
-
(2006)
LNCS 4001: Proceedings of the 18th Conference on Advanced Information Systems
, pp. 48
-
-
Mouratidis, H.1
Jùrjens, J.2
Fox, J.3
-
21
-
-
29744447253
-
Business-driven application security: From modeling to managing secure applications
-
doi:10.1147/sj.444.0847
-
Nagaratnam, N., Nadalin, A., Hondo, M., Mc-Intosh, M., & Austel, P. (2005). Business-driven application security: From modeling to managing secure applications. IBM Systems Journal, 44(4), 847-867. doi:10.1147/sj.444.0847
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
, pp. 847-867
-
-
Nagaratnam, N.1
Nadalin, A.2
Hondo, M.3
Mc-Intosh, M.4
Austel, P.5
-
22
-
-
74849101810
-
Misuse patterns in VoIP
-
Wiley InterScience. Retrieved November 25, 2009 from
-
Pelaez, J., Fernandez, E. B., & Larrondo-Petrie, M. M. (2009). Misuse patterns in VoIP. Security and Communication Networks. Wiley InterScience. Retrieved November 25, 2009 from http://www3. interscience.wiley.com/journal/122324463/ abstract.
-
(2009)
Security and Communication Networks
-
-
Elaez, J.1
Fernandez, E.B.2
Larrondo-Petrie, M.M.3
-
23
-
-
33746680163
-
A pattern system for access control
-
In C. Farkas and P. Samarati (Eds.), Amsterdam, Netherlands, Kluwer Academic Publishers
-
Priebe, T., Fernandez, E. B., Mehlau, J. I., & Pernul, G. (2004). A pattern system for access control. In C. Farkas and P. Samarati (Eds.) Research Directions in Data and Applications Security XVIII: Proceedings of the 18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security (pp. 25-28). Amsterdam, Netherlands: Kluwer Academic Publishers.
-
(2004)
Research Directions in Data and Applications Security XVIII: Proceedings of the 18th. Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 25
-
-
Priebe, T.1
Fernandez, E.B.2
Mehlau, J.I.3
Pernul, G.4
-
24
-
-
77954096401
-
Security patterns related to security requirements
-
In E. Fernandez-Medina and M. Inmaculada (Eds.), Setúbal, Portugal, INSTICC Press
-
Rosado, D. G., Gutierrez, C., Fernandez-Medina, E., & Piattini, M. (2006). Security patterns related to security requirements. In E. Fernandez-Medina and M. Inmaculada (Eds.) Security in Informaiton Systems: Proceedings of the 4th International Workshop on Security in Information Systems. Setúbal, Portugal: INSTICC Press.
-
(2006)
Security in Informaiton Systems: Proceedings of the 4th International Workshop on Security in Information Systems
-
-
Rosado, D.G.1
Gutierrez, C.2
Fernandez-Medina, E.3
Piattini, M.4
-
25
-
-
0016555241
-
The protection of information in computer systems
-
Retrieved November 25, 2009 from
-
Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308. Retrieved November 25, 2009 from http://web. mit.edu/Saltzer/www/publications/protection/ index.html
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
26
-
-
33750050331
-
-
Hoboken, NJ, John Wiley & Sons
-
Schumacher, M., Fernandez, E. B., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security patterns: Integrating security and systems engineering. Hoboken, NJ: John Wiley & Sons.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
27
-
-
84899173095
-
-
Secure Systems Research Group, Retrieved November 25, 2009 from
-
Secure Systems Research Group. (2009). Florida Atlantic University. Retrieved November 25, 2009 from http://security.ceecs.fau.edu/
-
(2009)
Florida Atlantic University
-
-
-
28
-
-
68149181919
-
A multidimensional classification for users of security patterns
-
VanHilst, M., Fernandez, E. B., & Braz, F. (2009a). A multidimensional classification for users of security patterns. Journal of Research and Practice in Information Technology, 41(2), 87-97.
-
(2009)
Journal of Research and Practice in Information Technology
, vol.41
, Issue.2
, pp. 87-97
-
-
Vanhilst, M.1
Fernandez, E.B.2
Braz, F.3
-
29
-
-
84899282537
-
Building a concept grid to classify security patterns
-
In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.), Tokyo:NII. Retrieved November 25, 2009 from
-
VanHilst, M., Fernandez, E. B., & Braz, F. (2009b). Building a concept grid to classify security patterns. In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.) Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 34-39). Tokyo:NII. Retrieved November 25, 2009 from http://grace-center.jp/downloads/GRACE-TR-2009-07.pdf.
-
(2009)
Proceedings of the Third International Workshop on Software Patterns and Quality
, pp. 34
-
-
Vanhilst, M.1
Fernandez, E.B.2
Braz, F.3
-
32
-
-
73849138269
-
Improving the classification of security patterns
-
In, Los Alamitos, CA: IEEE Computer Society
-
Washizaki, H., Fernandez, E. B., Maruyama, K., Kubo, A., & Yoshioka, N. (2009). Improving the classification of security patterns. In Proceedings of the International Workshop on Database and Expert Systems Applications (pp. 165-170). Los Alamitos, CA: IEEE Computer Society.
-
(2009)
Proceedings of the International Workshop on Database and Expert Systems Applications
, pp. 165-170
-
-
Washizaki, H.1
Fernandez, E.B.2
Maruyama, K.3
Kubo, A.4
Yoshioka, N.5
-
34
-
-
17744383167
-
Security patterns: A method for constructing secure and efficient inter-company coordination systems
-
In, Los Alamitos, CA: IEEE Computer Society
-
Yoshioka, N., Honiden, S., & Finkelstein, A. (2004) Security patterns: A method for constructing secure and efficient inter-company coordination systems. In Proceedings of the Eighth IEEE International Enterprise Distributed Object Computing Conference (pp. 84-97). Los Alamitos, CA: IEEE Computer Society.
-
(2004)
Proceedings of the Eighth IEEE International Enterprise Distributed Object Computing Conference
, pp. 84-97
-
-
Yoshioka, N.1
Honiden, S.2
Finkelstein, A.3
|