메뉴 건너뛰기




Volumn , Issue , 2010, Pages 16-31

Using security patterns to develop secure systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80054087301     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61520-837-1.ch002     Document Type: Chapter
Times cited : (30)

References (34)
  • 12
    • 84899213241 scopus 로고    scopus 로고
    • Security patterns and quality
    • In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.), in, conjuction with OOPSLA 2009., Retrieved November 25, 2009 from
    • Fernandez, E. B., Yoshioka, N., & Washizaki, H. (2009b). Security patterns and quality. In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.) Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 46-47).), in conjuction with OOPSLA 2009. Retrieved November 25, 2009 from http://gracecenter.jp/downloads/GRACE-TR-2009-07.pdf.
    • (2009) Proceedings of the Third International Workshop on Software Patterns and Quality , pp. 46-47
    • Fernandez, E.B.1    Yoshioka, N.2    Washizaki, H.3
  • 16
    • 34547107609 scopus 로고    scopus 로고
    • Organizing security patterns
    • doi:10.1109/MS.2007.114
    • Hafiz, M., Adamczyk, P., & Johnson, R. E. (2007). Organizing security patterns. IEEE Software, 24(4), 52-60. doi:10.1109/MS.2007.114
    • (2007) IEEE Software , vol.24 , Issue.4 , pp. 52-60
    • Hafiz, M.1    Adamczyk, P.2    Johnson, R.E.3
  • 19
    • 77952349147 scopus 로고    scopus 로고
    • Analysing security in information systems
    • Presented at the, Porto Portugal. Retrieved November 25, 2009, from
    • Mouratidis, H., & Giorgini, P. (2004). Analysing security in information systems. Presented at the Second International Workshop on Security in Information Systems, Porto Portugal. Retrieved November 25, 2009, from http://www.dit.unitn. it/~pgiorgio/papers/ICEISWorkshop04.pdf
    • (2004) Second International Workshop on Security in Information Systems
    • Mouratidis, H.1    Giorgini, P.2
  • 21
    • 29744447253 scopus 로고    scopus 로고
    • Business-driven application security: From modeling to managing secure applications
    • doi:10.1147/sj.444.0847
    • Nagaratnam, N., Nadalin, A., Hondo, M., Mc-Intosh, M., & Austel, P. (2005). Business-driven application security: From modeling to managing secure applications. IBM Systems Journal, 44(4), 847-867. doi:10.1147/sj.444.0847
    • (2005) IBM Systems Journal , vol.44 , Issue.4 , pp. 847-867
    • Nagaratnam, N.1    Nadalin, A.2    Hondo, M.3    Mc-Intosh, M.4    Austel, P.5
  • 22
    • 74849101810 scopus 로고    scopus 로고
    • Misuse patterns in VoIP
    • Wiley InterScience. Retrieved November 25, 2009 from
    • Pelaez, J., Fernandez, E. B., & Larrondo-Petrie, M. M. (2009). Misuse patterns in VoIP. Security and Communication Networks. Wiley InterScience. Retrieved November 25, 2009 from http://www3. interscience.wiley.com/journal/122324463/ abstract.
    • (2009) Security and Communication Networks
    • Elaez, J.1    Fernandez, E.B.2    Larrondo-Petrie, M.M.3
  • 25
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Retrieved November 25, 2009 from
    • Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308. Retrieved November 25, 2009 from http://web. mit.edu/Saltzer/www/publications/protection/ index.html
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 27
    • 84899173095 scopus 로고    scopus 로고
    • Secure Systems Research Group, Retrieved November 25, 2009 from
    • Secure Systems Research Group. (2009). Florida Atlantic University. Retrieved November 25, 2009 from http://security.ceecs.fau.edu/
    • (2009) Florida Atlantic University
  • 29
    • 84899282537 scopus 로고    scopus 로고
    • Building a concept grid to classify security patterns
    • In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.), Tokyo:NII. Retrieved November 25, 2009 from
    • VanHilst, M., Fernandez, E. B., & Braz, F. (2009b). Building a concept grid to classify security patterns. In H. Washizaki, N. Yoshioka, E.B.Fernandez, & J. Jürjens (Eds.) Proceedings of the Third International Workshop on Software Patterns and Quality (pp. 34-39). Tokyo:NII. Retrieved November 25, 2009 from http://grace-center.jp/downloads/GRACE-TR-2009-07.pdf.
    • (2009) Proceedings of the Third International Workshop on Software Patterns and Quality , pp. 34
    • Vanhilst, M.1    Fernandez, E.B.2    Braz, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.