-
1
-
-
0004101993
-
-
Wiley
-
Buschmann, F., Meunier, R., Rohnert, H., Sommerland, P., Stal, M.: Pattern- oriented software architecture. Wiley (1996)
-
(1996)
Pattern- Oriented Software Architecture
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerland, P.4
Stal, M.5
-
3
-
-
0011963151
-
Pattern-Oriented Software Architecture
-
John Wiley & Sons, West Sussex
-
Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern-Oriented Software Architecture. Patterns for Concurrent and Networked Objects, vol. 2. John Wiley & Sons, West Sussex (2000)
-
(2000)
Patterns for Concurrent and Networked Objects
, vol.2
-
-
Schmidt, D.1
Stal, M.2
Rohnert, H.3
Buschmann, F.4
-
4
-
-
84862283276
-
Securing distributed systems using patterns: A survey
-
Uzunov, A.V., Fernandez, E.B., Falkner, K.: Securing distributed systems using patterns: A survey. Computers & Security 31, 681-703 (2012)
-
(2012)
Computers & Security
, vol.31
, pp. 681-703
-
-
Uzunov, A.V.1
Fernandez, E.B.2
Falkner, K.3
-
5
-
-
77952357722
-
Abstract security patterns
-
Fernandez, E.B., Washizaki, H., Yoshioka, N.: Abstract security patterns. In: Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu 2008) (Position paper), in Conjunction with the 15th Conf. on Pattern Languages of Programs (PLoP), Nashville, TN (2008)
-
Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu 2008) (Position Paper), in Conjunction with the 15th Conf. on Pattern Languages of Programs (PLoP), Nashville, TN (2008)
-
-
Fernandez, E.B.1
Washizaki, H.2
Yoshioka, N.3
-
8
-
-
78349247421
-
-
Wiley
-
Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., Sundarrajan, S.: Distributed Systems Security: Issues, Processes and Solutions. Wiley (2009)
-
(2009)
Distributed Systems Security: Issues, Processes and Solutions
-
-
Belapurkar, A.1
Chakrabarti, A.2
Ponnapalli, H.3
Varadarajan, N.4
Padmanabhuni, S.5
Sundarrajan, S.6
-
10
-
-
84862275346
-
Securing design patterns for distributed systems
-
Xiao, Y. (ed.) ch. 3, Auerbach Pubs., Taylor & Francis Group, LLC
-
Fernandez, E.B., Larrondo Petrie, M.M.: Securing design patterns for distributed systems. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, ch. 3, pp. 53-66. Auerbach Pubs., Taylor & Francis Group, LLC (2007)
-
(2007)
Security in Distributed, Grid, and Pervasive Computing
, pp. 53-66
-
-
Fernandez, E.B.1
Larrondo Petrie, M.M.2
-
15
-
-
84871374954
-
The Secure MVC pattern. Accepted for the First International Symposium on Software Architecture and Patterns
-
Delessy, N., Fernandez, E.B.: The Secure MVC pattern. Accepted for the First International Symposium on Software Architecture and Patterns, In: Conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology (LACCEI), Panama City, Panama, July 23-27 (2012)
-
Conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology (LACCEI), Panama City, Panama, July 23-27 (2012)
-
-
Delessy, N.1
Fernandez, E.B.2
-
16
-
-
53149124388
-
The secure three-tier architecture
-
Fernandez, E.B., Fonoage, M., VanHilst, M., Larrondo-Petrie, M.M.: The secure three-tier architecture. In: Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008), Barcelona, Spain, pp. 555-560 (2008)
-
(2008)
Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008), Barcelona, Spain
, pp. 555-560
-
-
Fernandez, E.B.1
Fonoage, M.2
VanHilst, M.3
Larrondo-Petrie, M.M.4
-
17
-
-
84899863088
-
Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish/Subscribe
-
Fernandez, E.B., Yoshioka, N., Washizaki, H.: Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish/Subscribe. In: 18th Conference on Pattern Languages of Programs, PLoP (2011)
-
18th Conference on Pattern Languages of Programs, PLoP (2011)
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
-
18
-
-
33845264120
-
Defining Security Requirements Through Misuse Actions
-
Ochoa, S.F., Roman, G.-C. (eds.) Springer US
-
Fernandez, E.B., VanHilst, M., Larrondo Petrie, M.M., Huang, S.: Defining Security Requirements Through Misuse Actions. In: Ochoa, S.F., Roman, G.-C. (eds.) Advanced Software Engineering: Expanding the Frontiers of Software Technology. IFIP, pp. 123-137. Springer US (2006)
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology. IFIP
, pp. 123-137
-
-
Fernandez, E.B.1
VanHilst, M.2
Larrondo Petrie, M.M.3
Huang, S.4
-
19
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
Mouratidis, H., Giorgini, P. (eds.) IDEA Press
-
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: A methodology to develop secure systems using patterns. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Vision, pp. 107-126. IDEA Press (2006)
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
20
-
-
84862277578
-
Security Patterns in Practice: Building Secure Architectures using Software Patterns
-
1st edn. Wiley (to appear)
-
Fernandez, E.B.: Security Patterns in Practice: Building Secure Architectures using Software Patterns, 1st edn. Wiley Series on Software Design Patterns. Wiley (to appear)
-
Wiley Series on Software Design Patterns
-
-
Fernandez, E.B.1
-
21
-
-
0003880013
-
-
Addison-Wesley, Boston
-
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: elements of reusable object-oriented software. Addison-Wesley, Boston (1994)
-
(1994)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
22
-
-
0345565888
-
The many faces of publish/subscribe
-
Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish/subscribe. ACM Comput. Surv. 35, 114-131 (2003)
-
(2003)
ACM Comput. Surv.
, vol.35
, pp. 114-131
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
23
-
-
33751006553
-
Tropyc: A pattern language for cryptographic object-oriented software
-
Harrison, N., Foote, B., Rohnert, H. (eds.) ch. 16. Addison-Wesley
-
Braga, A., Rubira, C., Dahab, R.: Tropyc: A pattern language for cryptographic object-oriented software. In: Harrison, N., Foote, B., Rohnert, H. (eds.) Pattern Languages of Program Design 4, ch. 16. Addison-Wesley (1998)
-
(1998)
Pattern Languages of Program Design
, vol.4
-
-
Braga, A.1
Rubira, C.2
Dahab, R.3
-
24
-
-
33750050331
-
Security Patterns: Integrating security and systems engineering
-
Wiley
-
Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating security and systems engineering. Wiley Series in Software Design Patterns. Wiley (2006)
-
(2006)
Wiley Series in Software Design Patterns
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
26
-
-
79954560765
-
The Authenticator Pattern
-
Brown, F.L., Divietri, J., De Villegas, G.D., Fernandez, E.B.: The Authenticator Pattern. In: Procs. of PLoP 1999 (1999)
-
(1999)
Procs. of PLoP 1999
-
-
Brown, F.L.1
Divietri, J.2
De Villegas, G.D.3
Fernandez, E.B.4
-
27
-
-
84865254626
-
Digital Signature with Hashing and XML Signature patterns
-
Hashizume, K., Fernandez, E.B., Huang, S.: Digital Signature with Hashing and XML Signature patterns. In: Procs. 14th European Conf. on Pattern Languages of Programs, EuroPLoP (2009)
-
Procs. 14th European Conf. on Pattern Languages of Programs, EuroPLoP (2009)
-
-
Hashizume, K.1
Fernandez, E.B.2
Huang, S.3
-
28
-
-
84892902868
-
A pattern system for access control
-
Farkas, C., Samarati, P. (eds.) Springer
-
Priebe, T., Fernandez, E.B., Mehlau, J., Pernul, G.: A pattern system for access control. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVIII, pp. 235-249. Springer (2004)
-
(2004)
Research Directions in Data and Applications Security XVIII
, pp. 235-249
-
-
Priebe, T.1
Fernandez, E.B.2
Mehlau, J.3
Pernul, G.4
-
29
-
-
84871373781
-
-
submitted for publication
-
Uzunov, A.V., Fernandez, E.B., Falkner, K.: A software engineering approach to authorization in distributed, collaborative systems using security patterns and security solution frames (submitted for publication)
-
A Software Engineering Approach to Authorization in Distributed, Collaborative Systems Using Security Patterns and Security Solution Frames
-
-
Uzunov, A.V.1
Fernandez, E.B.2
Falkner, K.3
-
30
-
-
77953968420
-
Patterns for Access Control in Distributed Systems
-
Delessy, N., Fernandez, E.B., Larrondo-Petrie, M.M., Wu, J.: Patterns for Access Control in Distributed Systems. In: Proceedings of the 14th Pattern Languages of Programs Conference (PLoP), Monticello, Illinois, USA (2007)
-
Proceedings of the 14th Pattern Languages of Programs Conference (PLoP), Monticello, Illinois, USA (2007)
-
-
Delessy, N.1
Fernandez, E.B.2
Larrondo-Petrie, M.M.3
Wu, J.4
-
32
-
-
78149488290
-
Secure Publish-Subscribe Mediated Virtual Organizations
-
Ssekibuule, R.: Secure Publish-Subscribe Mediated Virtual Organizations. In: Procs. ISSA (2010), http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/18- Paper.pdf
-
Procs. ISSA (2010)
-
-
Ssekibuule, R.1
-
34
-
-
36549013845
-
Access Control in Decentralised Publish/Subscribe Systems
-
Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access Control in Decentralised Publish/Subscribe Systems. J. Netw. 2, 57-67 (2007)
-
(2007)
J. Netw.
, vol.2
, pp. 57-67
-
-
Pesonen, L.I.W.1
Eyers, D.M.2
Bacon, J.3
-
39
-
-
77956059013
-
How do architecture patterns and tactics interact? A model and annotation
-
Harrison, N.B., Avgeriou, P.: How do architecture patterns and tactics interact? A model and annotation. J. Syst. Softw. 83, 1735-1758 (2010)
-
(2010)
J. Syst. Softw.
, vol.83
, pp. 1735-1758
-
-
Harrison, N.B.1
Avgeriou, P.2
|