-
1
-
-
84885922668
-
-
The Largest Community of Security Professionals Available Anywhere
-
The Largest Community of Security Professionals Available Anywhere http://www.securityfocus.com/
-
-
-
-
2
-
-
84885903642
-
-
Astalavista.com, One of the world's most popular and comprehensive computer security web sites
-
Astalavista.com, One of the world's most popular and comprehensive computer security web sites http://www.astalavista.com/
-
-
-
-
4
-
-
34548122074
-
Architectural patterns for enabling application security
-
Joshep Yoder and Jeffrey Barcalow Architectural patterns for enabling application security PLoP, 1997 5, 6,7.
-
(1997)
PLoP
, pp. 567
-
-
Yoder, J.1
Barcalow, J.2
-
6
-
-
84885936510
-
-
Kienzle, D.M., Elder, M.C., Final Technical Report: Security Patterns for Web Application Development
-
Kienzle, D.M., Elder, M.C., "Final Technical Report: Security Patterns for Web Application Development." (Available at http://www.scrypt.net/-celer/securitypatterns/final%20report.pdf).
-
-
-
-
7
-
-
84885933518
-
-
IBM's Security Strategy team (2004) Introduction to Business Security Patterns An IBM White Paper 2004
-
IBM's Security Strategy team (2004) "Introduction to Business Security Patterns An IBM White Paper" Available at http://www-3.ibm.com/ security/patterns/intro.pdf 2004.
-
-
-
-
8
-
-
33645586196
-
Using security patterns to model and analyze security requirements
-
Konrad, S., B.H.C Cheng, Campbell, Laura A., and Wassermann R., (2003) "Using Security Patterns to Model and Analyze Security Requirements" Proc Requirements for High Assurance Systems Workshop (RHAS '03).
-
(2003)
Proc Requirements for High Assurance Systems Workshop (RHAS '03)
-
-
Konrad, S.1
Cheng, B.H.C.2
Laura, A.3
Wassermann, R.4
-
13
-
-
84892902868
-
A pattern system for access control
-
(Sitges, Spain)
-
Torsten, P, Fernandez, E.B., Mehlau, J.I., Pernul, G (2004) "A pattern system for access control" 18th IFIP WG 11.3 Conference on Data and Applications Security, (Sitges, Spain).
-
(2004)
18th IFIP WG 11.3 Conference on Data and Applications Security
-
-
Torsten, P.1
Fernandez, E.B.2
Mehlau, J.I.3
Pernul, G.4
-
14
-
-
47849084790
-
-
Technical Report MSU-CSE-03-23, Computer Science and Engineering, Michigan State University, (East Lansing, Michigan)
-
Wassermann, R and Cheng, B.H.B., (2003) "Security patterns" Technical Report MSU-CSE-03-23, Computer Science and Engineering, Michigan State University, (East Lansing, Michigan).
-
(2003)
Security Patterns
-
-
Wassermann, R.1
Cheng, B.H.B.2
-
15
-
-
0003880013
-
-
Addison-Wesley, 1994
-
Gamma, E., Helm, R., Johnson, R., and Vlissides, J (1994) "Design patterns: Elements of Reusable Object-Oriented Software" Addison-Wesley, 1994
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
16
-
-
22544455788
-
Patterns for application firewalls
-
Delessy-Gassant, N., Fernandez E.B., Rajput S, and Larrondo-Petrie, M.M., (2004) "Patterns for Application Firewalls" PLoP'04.
-
(2004)
PLoP'04
-
-
Delessy-Gassant, N.1
Fernandez, E.B.2
Rajput, S.3
Larrondo-Petrie, M.M.4
-
19
-
-
33750945555
-
Security patterns for agent systems
-
(Irsee, Germany)
-
Mouratidis, H., Giorgini, P., Schumacher, M., (2003) "Security Patterns for Agent Systems" In Proceedings of Eighth European Conference on Pattern Languages of Programs, (Irsee, Germany).
-
(2003)
Proceedings of Eighth European Conference on Pattern Languages of Programs
-
-
Mouratidis, H.1
Giorgini, P.2
Schumacher, M.3
-
23
-
-
0031597155
-
Formalizing design patterns
-
IEEE Computer Society Press
-
Mikkonen, T (1998) "Formalizing design patterns" In Proc Of 20th ICSE, pages 115-124 IEEE Computer Society Press.
-
(1998)
Proc of 20th ICSE
, pp. 115-124
-
-
Mikkonen, T.1
|