메뉴 건너뛰기




Volumn 7672 LNCS, Issue , 2012, Pages 470-482

Secure middleware patterns

Author keywords

distributed systems security; middleware; publish subscribe; security patterns; software security

Indexed keywords

ARCHITECTURAL PATTERN; DISTRIBUTED APPLICATIONS; DISTRIBUTED SYSTEMS SECURITY; MIDDLEWARE ARCHITECTURE; PUBLISH/SUBSCRIBE; SECURITY FEATURES; SECURITY PATTERNS; SECURITY REQUIREMENTS; SECURITY THREATS; SOFTWARE DEVELOPMENT LIFE CYCLE; SOFTWARE PROBLEMS; SOFTWARE SECURITY; THREAT ANALYSIS;

EID: 84871386548     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-35362-8_35     Document Type: Conference Paper
Times cited : (8)

References (39)
  • 4
    • 84862283276 scopus 로고    scopus 로고
    • Securing distributed systems using patterns: A survey
    • Uzunov, A.V., Fernandez, E.B., Falkner, K.: Securing distributed systems using patterns: A survey. Computers & Security 31, 681-703 (2012)
    • (2012) Computers & Security , vol.31 , pp. 681-703
    • Uzunov, A.V.1    Fernandez, E.B.2    Falkner, K.3
  • 10
    • 84862275346 scopus 로고    scopus 로고
    • Securing design patterns for distributed systems
    • Xiao, Y. (ed.) ch. 3, Auerbach Pubs., Taylor & Francis Group, LLC
    • Fernandez, E.B., Larrondo Petrie, M.M.: Securing design patterns for distributed systems. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, ch. 3, pp. 53-66. Auerbach Pubs., Taylor & Francis Group, LLC (2007)
    • (2007) Security in Distributed, Grid, and Pervasive Computing , pp. 53-66
    • Fernandez, E.B.1    Larrondo Petrie, M.M.2
  • 20
    • 84862277578 scopus 로고    scopus 로고
    • Security Patterns in Practice: Building Secure Architectures using Software Patterns
    • 1st edn. Wiley (to appear)
    • Fernandez, E.B.: Security Patterns in Practice: Building Secure Architectures using Software Patterns, 1st edn. Wiley Series on Software Design Patterns. Wiley (to appear)
    • Wiley Series on Software Design Patterns
    • Fernandez, E.B.1
  • 23
    • 33751006553 scopus 로고    scopus 로고
    • Tropyc: A pattern language for cryptographic object-oriented software
    • Harrison, N., Foote, B., Rohnert, H. (eds.) ch. 16. Addison-Wesley
    • Braga, A., Rubira, C., Dahab, R.: Tropyc: A pattern language for cryptographic object-oriented software. In: Harrison, N., Foote, B., Rohnert, H. (eds.) Pattern Languages of Program Design 4, ch. 16. Addison-Wesley (1998)
    • (1998) Pattern Languages of Program Design , vol.4
    • Braga, A.1    Rubira, C.2    Dahab, R.3
  • 31
    • 70350786565 scopus 로고    scopus 로고
    • A security plane for publish/subscribe based content oriented networks
    • Wong, W., Verdi, F., Magalhaes, M.: A security plane for publish/subscribe based content oriented networks. In: Procs. ACM CoNEXT (2008)
    • Procs. ACM CoNEXT (2008)
    • Wong, W.1    Verdi, F.2    Magalhaes, M.3
  • 32
    • 78149488290 scopus 로고    scopus 로고
    • Secure Publish-Subscribe Mediated Virtual Organizations
    • Ssekibuule, R.: Secure Publish-Subscribe Mediated Virtual Organizations. In: Procs. ISSA (2010), http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/18- Paper.pdf
    • Procs. ISSA (2010)
    • Ssekibuule, R.1
  • 34
    • 36549013845 scopus 로고    scopus 로고
    • Access Control in Decentralised Publish/Subscribe Systems
    • Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access Control in Decentralised Publish/Subscribe Systems. J. Netw. 2, 57-67 (2007)
    • (2007) J. Netw. , vol.2 , pp. 57-67
    • Pesonen, L.I.W.1    Eyers, D.M.2    Bacon, J.3
  • 39
    • 77956059013 scopus 로고    scopus 로고
    • How do architecture patterns and tactics interact? A model and annotation
    • Harrison, N.B., Avgeriou, P.: How do architecture patterns and tactics interact? A model and annotation. J. Syst. Softw. 83, 1735-1758 (2010)
    • (2010) J. Syst. Softw. , vol.83 , pp. 1735-1758
    • Harrison, N.B.1    Avgeriou, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.