-
1
-
-
10044290492
-
Like it or not, web services are distributed objects
-
K.P. Birman. Like it or not, web services are distributed objects. Comm. of the ACM, vol. 47, No. 12, December 2004, 60–62.
-
(2004)
Comm. of the ACM
, vol.47
, Issue.12
, pp. 60-62
-
-
Birman, K.P.1
-
2
-
-
85056954465
-
Tropyc: Apattern language for cryptographic object-oriented software
-
N. Harrison, B. Foote, and H. Rohnert, Eds
-
A. Braga, C. Rubira, and R. Dahab. Tropyc: Apattern language for cryptographic object-oriented software. Chapter 16 in Pattern Languages of Program Design 4 (N. Harrison, B. Foote, and H. Rohnert, Eds.).
-
Chapter 16 in Pattern Languages of Program Design 4
-
-
Braga, A.1
Rubira, C.2
Dahab, R.3
-
3
-
-
0004101993
-
-
Wiley
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerland, and M. Stal. Pattern- Oriented Software Architecture. Wiley, 1996.
-
(1996)
Pattern- Oriented Software Architecture
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerland, P.4
Stal, M.5
-
10
-
-
33744905133
-
A Pattern Language for security models
-
E.B. Fernandez and R. Pan. A Pattern Language for security models. Proc. of PLoP 2001. http://jerry.cs.uiuc.edu/plop/plop2001/accepted_submissions.
-
(2001)
Proc. of Plop
-
-
Fernandez, E.B.1
Pan, R.2
-
13
-
-
33646056732
-
Some security issues of wireless systems
-
Advanced Distributed Systems, F.F. Ramos, V. Larios R. and H. Unger (Eds.), IEEE, Guadalajara, Mexico, January 24–28, 2005. Revised Selected Papers, LNCS 3563, Springer
-
E.B. Fernandez, S.A. Rajput, M. VanHilst, and M.M. Larrondo-Petrie. Some security issues of wireless systems, in Advanced Distributed Systems, F.F. Ramos, V. Larios R. and H. Unger (Eds.). Proc. of 5th International School and Symposium on Advanced Distributed Systems, ISSADS 2005, IEEE, Guadalajara, Mexico, January 24–28, 2005. Revised Selected Papers, LNCS 3563, Springer, 2005, 388–396.
-
(2005)
Proc. of 5Th International School and Symposium on Advanced Distributed Systems, ISSADS 2005
, pp. 388-396
-
-
Fernandez, E.B.1
Rajput, S.A.2
Vanhilst, M.3
Larrondo-Petrie, M.M.4
-
15
-
-
84899175349
-
Amethodology to develop secure systems using patterns
-
H. Mouratidis and P. Giorgini (Eds.), IDEA Press
-
E.B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. Van Hilst.Amethodology to develop secure systems using patterns, Chapter 5 in Integrating security and software engineering: Advances and FutureVision. H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006. 107–126.
-
(2006)
Chapter 5 in Integrating Security and Software Engineering: Advances and Futurevision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Van Hilst, M.4
-
17
-
-
33845264120
-
Defining security requirements through misuse actions
-
S.F. Ochoa and G.-C. Roman (Eds.), International Federation for Information Processing. Springer
-
E.B. Fernandez, M. VanHilst, M.M. Larrondo-Petrie, and S. Huang. Defining security requirements through misuse actions, Advanced Software Engineering: Expanding the Frontiers of Software Technology. S.F. Ochoa and G.-C. Roman (Eds.), International Federation for Information Processing. Springer, 2006, 123–137.
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology
, pp. 123-137
-
-
Fernandez, E.B.1
Vanhilst, M.2
Larrondo-Petrie, M.M.3
Huang, S.4
-
18
-
-
53149101805
-
A framework for heterogeneous middleware security
-
S.N. Foley, T.B. Quillinan, M. O’Connor, B.P. Mulcahy, and J.P. Morrison. A framework for heterogeneous middleware security. Proc. of the 13th Heterogeneous Computing Workshop (HCW’04), 1–11.
-
Proc. of the 13Th Heterogeneous Computing Workshop (HCW’04)
, pp. 1-11
-
-
Foley, S.N.1
Quillinan, T.B.2
O’Connor, M.3
Mulcahy, B.P.4
Morrison, J.P.5
-
19
-
-
0003880013
-
-
Addison-Wesley, Boston
-
E. Gamma, R. Helm, R. Johnson, J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, Boston, 1994.
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
20
-
-
0035370581
-
Middleware challenges ahead
-
D. Geibs, Middleware challenges ahead. Computer. June 2001, IEEE, 24–31.
-
(2001)
Computer
, pp. 24-31
-
-
Geibs, D.1
-
22
-
-
85056971442
-
-
Gramm-Leach-Bliley Act, Senate Banking Committee, Monday, November 1
-
Gramm-Leach-Bliley Act, Senate Banking Committee, Monday, November 1, 1999 http://www.senate.gov/banking/conf/fincon.pdf.
-
(1999)
-
-
-
23
-
-
85056940302
-
-
http://www.hipaa.org/.
-
-
-
-
24
-
-
0032154413
-
A pattern system for network management interfaces
-
R.K. Keller, J. Tessier, and G. von Bochmann. A pattern system for network management interfaces. Comm. of the ACM, vol. 41, No. 9, September 1998, 86–93.
-
(1998)
Comm. of the ACM
, vol.41
, Issue.9
, pp. 86-93
-
-
Keller, R.K.1
Tessier, J.2
Von Bochmann, G.3
-
26
-
-
53149129939
-
Verifiable identifiers in middleware security
-
10–14 Dec
-
U. Lang, D. Gollmann, R. Schreiner.Verifiable identifiers in middleware security. Proceedings 17th Annual Computer Security Applications Conference, ACSAC, 2001, 10–14 Dec. 2001.
-
(2001)
Proceedings 17Th Annual Computer Security Applications Conference, ACSAC
, vol.2001
-
-
Lang, U.1
Gollmann, D.2
Schreiner, R.3
-
28
-
-
85056922400
-
-
Object Management Group
-
Object Management Group, http://www.omg.com.
-
-
-
-
31
-
-
85056938174
-
-
SAML
-
SAML, http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security.
-
-
-
-
32
-
-
85056985381
-
-
One Hundred Seventh Congress of the United States of America, Sarbanes Oxley Act of 2002, January 23
-
One Hundred Seventh Congress of the United States of America, Sarbanes Oxley Act of 2002, January 23, 2002, http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf.
-
(2002)
-
-
-
33
-
-
84976840280
-
Using design patterns to develop reusable object-oriented communication software
-
D.C. Schmidt. Using design patterns to develop reusable object-oriented communication software. Comm. of the ACM, vol. 38, No. 10, October 1995, 65–74.
-
(1995)
Comm. of the ACM
, vol.38
, Issue.10
, pp. 65-74
-
-
Schmidt, D.C.1
-
34
-
-
0032676981
-
Applying patterns to develop extensible ORB middleware
-
April
-
D.C. Schmidt and C. Cleeland. Applying patterns to develop extensible ORB middleware. IEEE Comm. Mag., April 1999, 54–63.
-
(1999)
IEEE Comm. Mag
, pp. 54-63
-
-
Schmidt, D.C.1
Cleeland, C.2
-
36
-
-
33750050331
-
-
J. Wiley and Sons
-
M. Schumacher, E.B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. J. Wiley and Sons, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
41
-
-
12744277616
-
Architectural patterns for enabling application security
-
Also Chapter 15 in Pattern Languages of Program Design, N. Harrison, B. Foote, and H. Rohnert, Eds.), Addison- Wesley
-
J. Yoder and J. Barcalow. Architectural patterns for enabling application security. Proc. of the 4th Conference on Patterns Language of Programming (PLoP’97), http://jerry, cs.uiuc.edu/plop/plop97. Also Chapter 15 in Pattern Languages of Program Design, Vol. 4 (N. Harrison, B. Foote, and H. Rohnert, Eds.), Addison- Wesley, 2000.
-
(2000)
Proc. of the 4Th Conference on Patterns Language of Programming (PLoP’97)
, vol.4
-
-
Yoder, J.1
Barcalow, J.2
-
42
-
-
85056965549
-
-
XACML, http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml.
-
XACML
-
-
|