-
1
-
-
55049109759
-
Model-driven security engineering for trust management in SECTET
-
Alam, M., Breu, R., Hafner, M.: "Model-driven security engineering for trust management in SECTET;" J. Softw. 2(1), (2007), 47-59.
-
(2007)
J. Softw
, vol.2
, Issue.1
, pp. 47-59
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
4
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
Alexander, I.: "Misuse cases: use cases with hostile intent;" IEEE Software 20(1), (2003), 58-66.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
5
-
-
63349090625
-
A rigorous methodology for security architecture modeling and verification
-
In, IEEE
-
Ali, Y., El-Kassas, S., Mahmoud, M.: "A rigorous methodology for security architecture modeling and verification;" In HICSS09 42nd Hawaii International Conference on System Sciences 2009 IEEE, (2009), 1-10.
-
(2009)
HICSS09 42nd Hawaii International Conference on System Sciences 2009
, pp. 1-10
-
-
Ali, Y.1
El-Kassas, S.2
Mahmoud, M.3
-
6
-
-
80052133002
-
The ISDF Framework: Towards Secure Software Development
-
Alkussayer, A., Allen, W.H.: "The ISDF Framework: Towards Secure Software Development;" J. Inf. Process. Syst. 6, (2010), 91-104.
-
(2010)
J. Inf. Process. Syst
, vol.6
, pp. 91-104
-
-
Alkussayer, A.1
Allen, W.H.2
-
8
-
-
55449120251
-
SOMA: A method for developing service-oriented solutions
-
Arsanjani, A., Ghosh, S., Allam, A., Abdollah, T., Ganapathy, S., Holley, K.: "SOMA: A method for developing service-oriented solutions;" IBM Syst. J. 47(3), (2008), 377-396.
-
(2008)
IBM Syst. J
, vol.47
, Issue.3
, pp. 377-396
-
-
Arsanjani, A.1
Ghosh, S.2
Allam, A.3
Abdollah, T.4
Ganapathy, S.5
Holley, K.6
-
9
-
-
0242625201
-
Model driven security for processoriented systems
-
In, ACM Press
-
Basin, D., Doser, J., Lodderstedt, T.: "Model driven security for processoriented systems;" In Procs. of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM Press, (2003), 100-109.
-
(2003)
Procs. of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
10
-
-
33745471209
-
Model Driven Security
-
Basin, D., Doser, J., Lodderstedt, T.: "Model Driven Security;" ACM Trans. Softw. Eng. Methodol. 15(1), (2006), 39-91.
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
11
-
-
60849104397
-
Automated analysis of security-design models
-
Basin, D., Clavel, M., Doser, J. & Egea, M.: "Automated analysis of security-design models;" Inf. Softw. Technol. 51(5), (2009), 815-831.
-
(2009)
Inf. Softw. Technol
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
12
-
-
79960151725
-
A decade of model-driven security
-
In, Innsbruck, Austria, ACM
-
Basin, D., Clavel, M., Egea, M.: "A decade of model-driven security;" In Procs. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT). Innsbruck, Austria, ACM, (2011), 1-10.
-
(2011)
Procs. of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 1-10
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
-
13
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Baskerville, R.: "Information systems security design methods: implications for information systems development;" ACM Comput. Surv. 25(4), (1993), 375-414.
-
(1993)
ACM Comput. Surv
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
14
-
-
0004025223
-
-
2nd ed., Addison-Wesley Professional
-
Bass, L., Clements, P., Kazman, R.: "Software Architecture in Practice;" 2nd ed., Addison-Wesley Professional (2003).
-
(2003)
Software Architecture in Practice
-
-
Bass, L.1
Clements, P.2
Kazman, R.3
-
16
-
-
78349247421
-
-
Wiley, [Belapurkar et al. 2009]
-
Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., Sundarrajan, S.: "Distributed Systems Security: Issues, Processes and Solutions;" Wiley (2009).
-
(2009)
Distributed Systems Security: Issues, Processes and Solutions
-
-
Belapurkar, A.1
Chakrabarti, A.2
Ponnapalli, H.3
Varadarajan, N.4
Padmanabhuni, S.5
Sundarrajan, S.6
-
17
-
-
34548787238
-
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
-
Minneapolis, MN: IEEE Computer Society
-
Best, B., Jürjens, J., Nuseibeh, B.: "Model-Based Security Engineering of Distributed Information Systems Using UMLsec;" In Proceedings of the 29th International Conference on Software Engineering (ICSE), Minneapolis, MN: IEEE Computer Society, (2007), 581-590.
-
(2007)
Proceedings of the 29th International Conference on Software Engineering (ICSE)
, pp. 581-590
-
-
Best, B.1
Jürjens, J.2
Nuseibeh, B.3
-
18
-
-
84856580263
-
Patterns in Object-Oriented Analysis
-
Faculty of Business Administration and Economics, University of Hagen, Germany
-
Blaimer, N., Bortfeldt, A., Pankratz, G.: "Patterns in Object-Oriented Analysis;" Working Paper No. 451, Faculty of Business Administration and Economics, University of Hagen, Germany, (2010).
-
(2010)
Working Paper No. 451
-
-
Blaimer, N.1
Bortfeldt, A.2
Pankratz, G.3
-
19
-
-
84866900591
-
Security Design Patterns
-
The Open Group
-
Blakley, B., Heath, C.: "Security Design Patterns. " Technical Guide, The Open Group, (2004).
-
(2004)
Technical Guide
-
-
Blakley, B.1
Heath, C.2
-
21
-
-
57849125076
-
Eliciting Security Requirements through Misuse Activities
-
In, IEEE
-
Braz, F.A., Fernandez, E.B., VanHilst, M.: "Eliciting Security Requirements through Misuse Activities;" In Procs. 19th International Conference on Database and Expert Systems Applications (DEXA), IEEE, (2008), 328-333.
-
(2008)
Procs. 19th International Conference on Database and Expert Systems Applications (DEXA)
, pp. 328-333
-
-
Braz, F.A.1
Fernandez, E.B.2
VanHilst, M.3
-
22
-
-
3142750497
-
Tropos: An Agent-Oriented Software Development Methodology
-
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: "Tropos: An Agent-Oriented Software Development Methodology;" Auton. Agents Multi-Agent Syst. 8(3), (2004), 203-236.
-
(2004)
Auton. Agents Multi-Agent Syst
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
23
-
-
84935093956
-
Towards a systematic development of secure systems
-
L.J., Castro, E., Garcia-Villalba, J.C.H. (Eds.), Inf. Syst. Secur. J. (Special Issue)
-
Breu, R., Burger, K., Hafner, M.: "Towards a systematic development of secure systems;" Fernández-Medina, L.J., Castro, E., Garcia-Villalba, J.C.H. (Eds.), Inf. Syst. Secur. J. (Special Issue) 13(3), (2004), 1-12.
-
(2004)
Fernández-Medina
, vol.13
, Issue.3
, pp. 1-12
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
-
24
-
-
84994715673
-
Model-Driven Security Engineering of Service Oriented Systems
-
In Kaschek, R. et al. (Eds.), Springer, Berlin Heidelberg, [Breu et al. 2008]
-
Breu, R., Hafner, M., Innerhofer-Oberperfler, F., Wozak, F.: "Model-Driven Security Engineering of Service Oriented Systems;" In Kaschek, R. et al. (Eds.), Information Systems and e-Business Technologies: Springer, Berlin Heidelberg, (2008), 59-71.
-
(2008)
Information Systems and e-Business Technologies
, pp. 59-71
-
-
Breu, R.1
Hafner, M.2
Innerhofer-Oberperfler, F.3
Wozak, F.4
-
25
-
-
0004101993
-
-
Wiley
-
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., Stal, M.: "Pattern-Oriented Software Architecture Volume 1: A System of Patterns;" Wiley, (1996).
-
(1996)
Pattern-Oriented Software Architecture Volume 1: A System of Patterns
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
26
-
-
70450195382
-
A generative programming approach to developing pervasive computing systems
-
In, Denver, Colorado, USA
-
Cassou, D., Bertran, B., Loriant, N., Consel, C.: "A generative programming approach to developing pervasive computing systems;" In Procs. of the 8th International Conference on Generative Programming and Component Engineering (GPCE), Denver, Colorado, USA, (2009), 137-146.
-
(2009)
Procs. of the 8th International Conference on Generative Programming and Component Engineering (GPCE)
, pp. 137-146
-
-
Cassou, D.1
Bertran, B.2
Loriant, N.3
Consel, C.4
-
29
-
-
70349862227
-
Model-Driven Security in Practice: An Industrial Experience
-
In I. Schieferdecker, A. Hartman (Eds.), Springer, Berlin Heidelberg
-
Clavel, M., Silva, V. da, Braga, C., Egea, M.: "Model-Driven Security in Practice: An Industrial Experience;" In I. Schieferdecker, A. Hartman (Eds.), Model Driven Architecture-Foundations and Applications, Springer, Berlin Heidelberg, (2008), 326-337.
-
(2008)
Model Driven Architecture-Foundations and Applications
, pp. 326-337
-
-
Clavel, M.1
Silva, V.2
da Braga, C.3
Egea, M.4
-
30
-
-
0025446390
-
A model for security in distributed systems
-
[Cole 1990]
-
Cole, R.: "A model for security in distributed systems;" Comput. Secur. 9(4), (1990), 319-330.
-
(1990)
Comput. Secur
, vol.9
, Issue.4
, pp. 319-330
-
-
Cole, R.1
-
31
-
-
84871477474
-
A Systematic Account of Problem Frames
-
In, [Côté et al. 2008]
-
Côté, I., Hatebur, D., Heisel, M., Schmidt, H., Wentzlaff, I.: "A Systematic Account of Problem Frames;" In Procs. of EuroPLoP 2007, (2008), 749-767.
-
(2008)
Procs. of EuroPLoP 2007
, pp. 749-767
-
-
Côté, I.1
Hatebur, D.2
Heisel, M.3
Schmidt, H.4
Wentzlaff, I.5
-
32
-
-
57049186171
-
A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems
-
[Dai and Cooper 2007]
-
Dai, L., Cooper, K.: "A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems;" Int. J. Netw. Secur. 5(2), (2007), 187-198.
-
(2007)
Int. J. Netw. Secur
, vol.5
, Issue.2
, pp. 187-198
-
-
Dai, L.1
Cooper, K.2
-
33
-
-
30544450414
-
A comprehensive approach for the development of modular software architecture description languages
-
[Dashofy et al. 2005]
-
Dashofy, E.M., Hoek, A. van der, Taylor, R.N.: "A comprehensive approach for the development of modular software architecture description languages;" ACM Trans. Softw. Eng. Methodol. 14(2), (2005), 199-245.
-
(2005)
ACM Trans. Softw. Eng. Methodol
, vol.14
, Issue.2
, pp. 199-245
-
-
Dashofy, E.M.1
Hoek, A.2
van der Taylor, R.N.3
-
34
-
-
67349139935
-
On the secure software development process: CLASP, SDL and Touchpoints compared
-
[De Win et al. 2009]
-
De Win, B., Scandariato, R., Buyens, K., Grégoire, J., Joosen, W.: "On the secure software development process: CLASP, SDL and Touchpoints compared;" Inf. Softw. Technol. 51(7), (2009), 1152-1171.
-
(2009)
Inf. Softw. Technol
, vol.51
, Issue.7
, pp. 1152-1171
-
-
De Win, B.1
Scandariato, R.2
Buyens, K.3
Grégoire, J.4
Joosen, W.5
-
35
-
-
51949101035
-
Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research
-
Iowa State University,. [Dehlinger and Subramanian 2006]
-
Dehlinger, J., Subramanian, N.V.: "Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research;" Technical Report, Computer Science, Iowa State University, (2006).
-
(2006)
Technical Report, Computer Science
-
-
Dehlinger, J.1
Subramanian, N.V.2
-
36
-
-
49049090200
-
A pattern-driven security process for SOA applications
-
In, Barcelona, Spain: IEEE Computer Society, [Delessy and Fernandez 2008]
-
Delessy, N.A., Fernandez, E.B.: "A pattern-driven security process for SOA applications;" In Procs. of the 3rd International Conference on Availability, Security, and Reliability (ARES), Barcelona, Spain: IEEE Computer Society, (2008), 416-421.
-
(2008)
Procs. of the 3rd International Conference on Availability, Security, and Reliability (ARES)
, pp. 416-421
-
-
Delessy, N.A.1
Fernandez, E.B.2
-
37
-
-
77957287901
-
-
FAU Technical Report (unpublished), [Delessy et al. 2008]
-
Delessy, N., Fernandez, E.B., Larrondo-Petrie, M.M.: "A Pattern-Driven Process for Secure Service-Oriented Applications;" FAU Technical Report (unpublished), (2008).
-
(2008)
A Pattern-Driven Process for Secure Service-Oriented Applications
-
-
Delessy, N.1
Fernandez, E.B.2
Larrondo-Petrie, M.M.3
-
38
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
[Deng et al. 2003]
-
Deng, Y., Wang, J., Tsai, J.J.P., Beznosov, K.: "An approach for modeling and analysis of security system architectures;" IEEE Trans. Knowl. Data Eng. 15(5), (2003), 1099-1119.
-
(2003)
IEEE Trans. Knowl. Data Eng
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.2
Tsai, J.J.P.3
Beznosov, K.4
-
39
-
-
84970947585
-
Software engineering for security: A roadmap
-
In, ACM, [Devanbu and Stubblebine 2000]
-
Devanbu, P.T., Stubblebine, S.: "Software engineering for security: a roadmap;" In Procs. Conference on the Future of Software Engineering, ACM, (2000), 227-239.
-
(2000)
Procs. Conference on the Future of Software Engineering
, pp. 227-239
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
40
-
-
78149294719
-
A Systematic SOAbased Architecture Process
-
In, Boston, Massachusetts: Knowledge Systems Institute Graduate School, [Dias et al. 2009]
-
Dias, J.J.L., de Almeida, E.S., de Lemos Meida, S.R.: "A Systematic SOAbased Architecture Process;" In Procs. of the 21st International Conference on Software Engineering, Knowledge Engineering (SEKE), Boston, Massachusetts: Knowledge Systems Institute Graduate School, (2009), 328-333.
-
(2009)
Procs. of the 21st International Conference on Software Engineering, Knowledge Engineering (SEKE)
, pp. 328-333
-
-
Dias, J.J.L.1
de Almeida, E.S.2
de Lemos Meida, S.R.3
-
41
-
-
84874789494
-
A3. D4.2-Extended Set of S&D Patterns for Networks and Devices
-
[Dolinar et al. 2008]
-
Dolinar, K., Fuchs, A., Klobucar, T., Llarena, R., Maña, A., Muñoz, A., Porekar, J., Rudolph, C., Saljic, S, Serrano, D.: "A3. D4.2-Extended Set of S&D Patterns for Networks and Devices;" Technical Report, A3. D4.2, SERENITY-027587, (2008).
-
(2008)
Technical Report, A3. D4.2, SERENITY-027587
-
-
Dolinar, K.1
Fuchs, A.2
Klobucar, T.3
Llarena, R.4
Maña, A.5
Muñoz, A.6
Porekar, J.7
Rudolph, C.8
Saljic, S.9
Serrano, D.10
-
42
-
-
78650083109
-
Secure Design Patterns
-
Carnegie-Mellon University, SEI,. [Dougherty et al. 2009]
-
Dougherty, C., Sayre, K., Seacord, R.C., Svoboda, D., Togashi, K.: "Secure Design Patterns;" Technical Report, CMU/SEI-2009-TR-010, Carnegie-Mellon University, SEI, (2009).
-
(2009)
Technical Report, CMU/SEI-2009-TR-010
-
-
Dougherty, C.1
Sayre, K.2
Seacord, R.C.3
Svoboda, D.4
Togashi, K.5
-
43
-
-
35348824361
-
-
1st ed., Addison-Wesley Professional,. [Dowd et al. 2007]
-
Dowd, M., McDonald, J., Schuh, J.: "The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities;" 1st ed., Addison-Wesley Professional, (2007).
-
(2007)
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
-
-
Dowd, M.1
McDonald, J.2
Schuh, J.3
-
44
-
-
51749089325
-
-
1st ed., Prentice Hall PTR,. [Erl 2009]
-
Erl, T.: "SOA Design Patterns;" 1st ed., Prentice Hall PTR, (2009).
-
(2009)
SOA Design Patterns
-
-
Erl, T.1
-
45
-
-
0029547395
-
Formal specification of real-time dependable systems
-
In, Fort Lauderdale, FL: IEEE Computer Society, [Fernandez and France 1995]
-
Fernandez, E.B., France, R.B.: "Formal specification of real-time dependable systems;" In Procs. of the 1st IEEE Int. Conf. on Eng. of Complex Comp. Systems (ICECCS), Fort Lauderdale, FL: IEEE Computer Society, (1995), 342-348.
-
(1995)
Procs. of the 1st IEEE Int. Conf. on Eng. of Complex Comp. Systems (ICECCS)
, pp. 342-348
-
-
Fernandez, E.B.1
France, R.B.2
-
46
-
-
0031363895
-
Determining role rights from use cases
-
In, Fairfax, Virginia, US: ACM, [Fernandez and Hawkins 1997]
-
Fernandez, E.B., Hawkins, J.C.: "Determining role rights from use cases;" In Proceedings of the 2nd ACM Workshop on Role-based Access Control (RBAC), Fairfax, Virginia, US: ACM, (1997), 121-125.
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-based Access Control (RBAC)
, pp. 121-125
-
-
Fernandez, E.B.1
Hawkins, J.C.2
-
47
-
-
0012076316
-
An abstract authorization system for the Internet
-
In, IEEE, [Fernandez and Nair 1998]
-
Fernandez, E.B., Nair, K.R.: "An abstract authorization system for the Internet;" In Proceedings of the 9th International Workshop on Database and Expert Systems Applications, IEEE, (1998), 310-315.
-
(1998)
Proceedings of the 9th International Workshop on Database and Expert Systems Applications
, pp. 310-315
-
-
Fernandez, E.B.1
Nair, K.R.2
-
49
-
-
84910091477
-
Semantic analysis patterns
-
In, Salt Lake City, UT, [Fernandez and Yuan 2000]
-
Fernandez, E.B., Yuan, X.: "Semantic analysis patterns;" In Proceedings of the 19th International Conference on Conceptual Modeling, ER2000. Salt Lake City, UT, (2000), 183-195.
-
(2000)
Proceedings of the 19th International Conference on Conceptual Modeling, ER2000
, pp. 183-195
-
-
Fernandez, E.B.1
Yuan, X.2
-
51
-
-
84860080088
-
Layers and non-functional patterns
-
In, Phoenix,. [Fernandez 2003]
-
Fernandez, E.B.: "Layers and non-functional patterns;" In Procs. of ChiliPLoP 2003, Phoenix, (2003).
-
(2003)
Procs. of ChiliPLoP 2003
-
-
Fernandez, E.B.1
-
53
-
-
78651429914
-
A UML-based Methodology for Secure Systems: The Design Stage
-
In, Miami, FL,. [Fernandez et al. 2005]
-
Fernandez, E.B., Sorgente, T., Larrondo-Petrie, M.M.: "A UML-based Methodology for Secure Systems: The Design Stage;" In Proceedings of the Third International Workshop on Security in Information Systems (WOSIS), Miami, FL, (2005).
-
(2005)
Proceedings of the Third International Workshop on Security in Information Systems (WOSIS)
-
-
Fernandez, E.B.1
Sorgente, T.2
Larrondo-Petrie, M.M.3
-
54
-
-
84862288688
-
Security patterns and secure systems design
-
In, Mayaguez, Puerto Rico,. [Fernandez and Larrondo-Petrie 2006]
-
Fernandez, E.B., Larrondo-Petrie, M.M.: "Security patterns and secure systems design;" In Proceedings of the 4th Latin American and Caribbean Conference for Engineering and Technology (LACCEI), Mayaguez, Puerto Rico, (2006).
-
(2006)
Proceedings of the 4th Latin American and Caribbean Conference for Engineering and Technology (LACCEI)
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
-
55
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
In Giorgini, P., Mouratidis, H. (Eds.), IDEA Press, [Fernandez et al. 2006a]
-
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: "A methodology to develop secure systems using patterns;" In Giorgini, P., Mouratidis, H. (Eds.), Integrating security and software engineering: Advances and future vision, IDEA Press, (2006), 107-126.
-
(2006)
Integrating security and software engineering: Advances and future vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
56
-
-
36448960070
-
Defining Security Requirements through Misuse Actions
-
In Ochoa, S.F., Roman, G.-C. (Eds.), Springer US,. [Fernandez et al. 2006b]
-
Fernandez, E.B., VanHilst, M., Larrondo-Petrie, M.M., Huang, S.: "Defining Security Requirements through Misuse Actions;" In Ochoa, S.F., Roman, G.-C. (Eds.), Advanced Software Engineering: Expanding the Frontiers of Software Technology, Springer US, (2006).
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology
-
-
Fernandez, E.B.1
VanHilst, M.2
Larrondo-Petrie, M.M.3
Huang, S.4
-
57
-
-
84862275346
-
Securing design patterns for distributed systems
-
In Xiao, Y. (Ed.), Auerbach: CRC Press, [Fernandez and Larrondo-Petrie 2007]
-
Fernandez, E.B., Larrondo-Petrie, M.M.: "Securing design patterns for distributed systems;" In Xiao, Y. (Ed.), Security in Distributed, Grid, and Pervasive Computing, Auerbach: CRC Press, (2007), 53-66.
-
(2007)
Security in Distributed, Grid, and Pervasive Computing
, pp. 53-66
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
-
58
-
-
34248333055
-
Securing Analysis Patterns
-
In, Winston-Salem, North Carolina, ACM, [Fernandez and Yuan 2007]
-
Fernandez, E.B., Yuan, X.: "Securing Analysis Patterns;" In Proceedings of the 45th Annual Southeast Regional Conference, Winston-Salem, North Carolina, ACM, (2007), 288-293.
-
(2007)
Proceedings of the 45th Annual Southeast Regional Conference
, pp. 288-293
-
-
Fernandez, E.B.1
Yuan, X.2
-
59
-
-
36448967526
-
Attack Patterns: A New Forensic and Design Tool
-
In Craiger, P., Shenoi, S. (Eds.), Springer, New York, [Fernandez et al. 2007a]
-
Fernandez, E.B., Pelaez, J., Larrondo-Petrie, M.: "Attack Patterns: A New Forensic and Design Tool;" In Craiger, P., Shenoi, S. (Eds.), Advances in Digital Forensics III, Springer, New York, (2007), 345-357.
-
(2007)
Advances in Digital Forensics III
, pp. 345-357
-
-
Fernandez, E.B.1
Pelaez, J.2
Larrondo-Petrie, M.3
-
60
-
-
47849130826
-
Extending a Secure System Development Methodology to SOA
-
In, IEEE, [Fernandez et al. 2007b]
-
Fernandez, E.B., Cholmondeley, P., Zimmermann, O.: "Extending a Secure System Development Methodology to SOA;" In Procs. of the 18th International Workshop on Database and Expert Systems Applications, IEEE, (2007), 749-754.
-
(2007)
Procs. of the 18th International Workshop on Database and Expert Systems Applications
, pp. 749-754
-
-
Fernandez, E.B.1
Cholmondeley, P.2
Zimmermann, O.3
-
62
-
-
79960307542
-
Security patterns and a methodology to apply them
-
In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Boston, MA: Springer Verlag, [Fernandez 2009]
-
Fernandez, E.B.: "Security patterns and a methodology to apply them;" In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Security and Dependability for Ambient Intelligence, Boston, MA: Springer Verlag, (2009), 37-46.
-
(2009)
Security and Dependability for Ambient Intelligence
, pp. 37-46
-
-
Fernandez, E.B.1
-
63
-
-
70349706065
-
Modeling misuse patterns
-
In, Fukuoka, Fukuoka Prefecture, Japan: IEEE Computer Society, [Fernandez et al. 2009]
-
Fernandez, E.B., Yoshioka, N., Washizaki, H.: "Modeling misuse patterns;" In Procs. of the 2009 International Conference on Availability, Reliability and Security, Fukuoka, Fukuoka Prefecture, Japan: IEEE Computer Society, (2009), 566-571.
-
(2009)
Procs. of the 2009 International Conference on Availability, Reliability and Security
, pp. 566-571
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
-
64
-
-
79955939364
-
Building Secure Systems: From Threats to Security Patterns
-
In, IEEE, [Fernandez and Mujica 2010]
-
Fernandez, E.B., Mujica, S.: "Building Secure Systems: From Threats to Security Patterns;" In Procs. of the 29th International Conference of the Chilean Computer Science Society (SCCC), IEEE, (2010), 66-70.
-
(2010)
Procs. of the 29th International Conference of the Chilean Computer Science Society (SCCC)
, pp. 66-70
-
-
Fernandez, E.B.1
Mujica, S.2
-
65
-
-
80054087301
-
Using security patterns to develop secure systems
-
In Mouratidis, H. (Ed.), IGI Global Group, [Fernandez et al. 2011]
-
Fernandez, E.B., Yoshioka, N., Washizaki, H., Jürjens, J., VanHilst, M., Pernul, G.: "Using security patterns to develop secure systems;" In Mouratidis, H. (Ed.), Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global Group, (2011), 16-31.
-
(2011)
Software Engineering for Secure Systems: Industrial and Research Perspectives
, pp. 16-31
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
Jürjens, J.4
VanHilst, M.5
Pernul, G.6
-
66
-
-
84871386548
-
Secure Middleware Patterns
-
In Y. Xiang, J. Lopez, C.-C.J. Kuo and W. Zhou (Eds.), Melbourne, Australia: LNCS 7672, Springer, Heidelberg, [Fernandez and Uzunov 2012]
-
Fernandez, E.B., Uzunov, A.V.: "Secure Middleware Patterns;" In Y. Xiang, J. Lopez, C.-C.J. Kuo and W. Zhou (Eds.), Procs. of the 4th International Symposium on Cyberspace Safety and Security (CSS). Melbourne, Australia: LNCS 7672, Springer, Heidelberg, (2012), 470-482.
-
(2012)
Procs. of the 4th International Symposium on Cyberspace Safety and Security (CSS)
, pp. 470-482
-
-
Fernandez, E.B.1
Uzunov, A.V.2
-
68
-
-
60849106337
-
Model-Driven Development for secure information systems
-
[Fernández-Medina et al. 2009]
-
Fernández-Medina, E., Jürjens, J., Trujillo, J., Jajodia, S.: "Model-Driven Development for secure information systems;" Inf. Softw. Technol. 51(5), (2009), 809-814.
-
(2009)
Inf. Softw. Technol
, vol.51
, Issue.5
, pp. 809-814
-
-
Fernández-Medina, E.1
Jürjens, J.2
Trujillo, J.3
Jajodia, S.4
-
69
-
-
2942713443
-
Security Use Cases
-
[Firesmith 2003]
-
Firesmith, D.: "Security Use Cases;" J. Object Technol. 2(3), (2003), 53-64.
-
(2003)
J. Object Technol
, vol.2
, Issue.3
, pp. 53-64
-
-
Firesmith, D.1
-
70
-
-
17644401409
-
Bringing security home: A process for developing secure and usable systems
-
In, ACM, [Flechais et al. 2003]
-
Flechais, I., Sasse, M.A., Hailes, S.M.V.: "Bringing security home: a process for developing secure and usable systems;" In Proceedings of the 2003 Workshop on New Security Paradigms, ACM, (2003), 49-57.
-
(2003)
Proceedings of the 2003 Workshop on New Security Paradigms
, pp. 49-57
-
-
Flechais, I.1
Sasse, M.A.2
Hailes, S.M.V.3
-
71
-
-
84931024051
-
Integrating security and usability into the requirements and design process
-
[Flechais et al. 2007]
-
Flechais, I., Mascolo, C., Sasse, M.A.: "Integrating security and usability into the requirements and design process;" Int. J. Electron. Secur. Digit. Forensics 1(1), (2007), 12-26.
-
(2007)
Int. J. Electron. Secur. Digit. Forensics
, vol.1
, Issue.1
, pp. 12-26
-
-
Flechais, I.1
Mascolo, C.2
Sasse, M.A.3
-
72
-
-
47749136281
-
A Generic Approach for Automatic Model Composition
-
In Giese, H. (Ed.), Springer, Berlin Heidelberg, [Fleurey et al. 2008]
-
Fleurey, F., Baudry, B., France, R., Ghosh, S.: "A Generic Approach for Automatic Model Composition;" In Giese, H. (Ed.), Models in Software Engineering, Springer, Berlin Heidelberg, (2008), 7-15.
-
(2008)
Models in Software Engineering
, pp. 7-15
-
-
Fleurey, F.1
Baudry, B.2
France, R.3
Ghosh, S.4
-
73
-
-
0003982659
-
-
2nd ed., Morgan Kaufmann,. [Foster and Kesselman 2003]
-
Foster, I., Kesselman, C.: "The Grid 2, Second Edition: Blueprint for a New Computing Infrastructure;" 2nd ed., Morgan Kaufmann, (2003).
-
(2003)
The Grid 2, Second Edition: Blueprint for a New Computing Infrastructure
-
-
Foster, I.1
Kesselman, C.2
-
74
-
-
0141572943
-
Patterns as precise characterizations of designs
-
Colorado State University,. [France et al. 2002]
-
France, R.B., Kim, D., Song, E., Ghosh, S.: "Patterns as precise characterizations of designs;" Technical Report, Colorado State University, (2002).
-
(2002)
Technical Report
-
-
France, R.B.1
Kim, D.2
Song, E.3
Ghosh, S.4
-
75
-
-
5744230994
-
Aspect-oriented approach to early design modelling
-
[France et al. 2004a]
-
France, R., Ray, I., Georg, G., Ghosh, S.: "Aspect-oriented approach to early design modelling;" IEE Proc.-Softw. 151(4), (2004), 173-185.
-
(2004)
IEE Proc.-Softw
, vol.151
, Issue.4
, pp. 173-185
-
-
France, R.1
Ray, I.2
Georg, G.3
Ghosh, S.4
-
76
-
-
1942468141
-
A UML-based pattern specification technique
-
[France et al. 2004b]
-
France, R., Kim, D., Ghosh, S., Song, E.: "A UML-based pattern specification technique;" IEEE Trans. on Softw. Eng. 30(3), (2004), 193-206.
-
(2004)
IEEE Trans. on Softw. Eng
, vol.30
, Issue.3
, pp. 193-206
-
-
France, R.1
Kim, D.2
Ghosh, S.3
Song, E.4
-
77
-
-
34748861160
-
Model-driven Development of Complex Software: A Research Roadmap
-
In, IEEE, [France and Rumpe 2007]
-
France, R., Rumpe, B.: "Model-driven Development of Complex Software: A Research Roadmap;" In Future of Software Engineering, IEEE, (2007), 37-54.
-
(2007)
Future of Software Engineering
, pp. 37-54
-
-
France, R.1
Rumpe, B.2
-
79
-
-
41349112658
-
An approach to web services oriented modeling and validation
-
In, ACM Press, [Fu et al. 2006]
-
Fu, Y., Dong, Z., He, X.: "An approach to web services oriented modeling and validation;" In Proceedings of the 2006 International Workshop on Service-Oriented Software Engineering (SOSE), ACM Press, (2006), 81.
-
(2006)
Proceedings of the 2006 International Workshop on Service-Oriented Software Engineering (SOSE)
, pp. 81
-
-
Fu, Y.1
Dong, Z.2
He, X.3
-
80
-
-
74549181023
-
Security patterns, towards a further level
-
In, Milan, Italy: INSTICC Press, [Gallego-Nicasio et al. 2009]
-
Gallego-Nicasio, B., Muñoz, A., Maña, A., Serrano, D.: "Security patterns, towards a further level;" In SECRYPT 2009-International Conference on Security and Cryptography, Milan, Italy: INSTICC Press, (2009), 349-356.
-
(2009)
SECRYPT 2009-International Conference on Security and Cryptography
, pp. 349-356
-
-
Gallego-Nicasio, B.1
Muñoz, A.2
Maña, A.3
Serrano, D.4
-
81
-
-
0003880013
-
-
Addison-Wesley Professional, [Gamma et al. 1995]
-
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: "Design Patterns: Elements of Reusable Object-Oriented Software;" Addison-Wesley Professional, (1995).
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
82
-
-
84863712088
-
Applying dynamic separation of aspects to distributed systems security: A case study
-
[García et al. 2012]
-
García, M., Llewellyn-Jones, D., Ortin, F., Merabti, M.: "Applying dynamic separation of aspects to distributed systems security: A case study;" IET Softw. 6(3), (2012), 231-248.
-
(2012)
IET Softw
, vol.6
, Issue.3
, pp. 231-248
-
-
García, M.1
Llewellyn-Jones, D.2
Ortin, F.3
Merabti, M.4
-
83
-
-
45849114537
-
Using aspects to design a secure system
-
In, IEEE, [Georg et al. 2002a]
-
Georg, G., Ray, I., France, R.: "Using aspects to design a secure system;" In Proceedings of the 8th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), IEEE, (2002), 117-126.
-
(2002)
Proceedings of the 8th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS)
, pp. 117-126
-
-
Georg, G.1
Ray, I.2
France, R.3
-
84
-
-
84904321102
-
Designing High Integrity Systems using Aspects
-
In, [Georg et al. 2002b]
-
Georg, G., France, R., Ray, I.: "Designing High Integrity Systems using Aspects;" In Proceedings of the Fifth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS), (2002), 37-57.
-
(2002)
Proceedings of the Fifth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS)
, pp. 37-57
-
-
Georg, G.1
France, R.2
Ray, I.3
-
85
-
-
33746838915
-
Aspect-Oriented Risk Driven Development of Secure Applications
-
E., Liu, P. (Eds.), Data and Applications Security: Springer Berlin Heidelberg, [Georg et al. 2006]
-
Georg, G., Houmb, S.H., Ray, I.: "Aspect-Oriented Risk Driven Development of Secure Applications;" In Damiani, E., Liu, P. (Eds.), Data and Applications Security: Springer Berlin Heidelberg, (2006), 282-296.
-
(2006)
In Damiani
, pp. 282-296
-
-
Georg, G.1
Houmb, S.H.2
Ray, I.3
-
86
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
[Georg et al. 2009]
-
Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: "An aspect-oriented methodology for designing secure applications;" Inf. Softw. Technol. 51(5), (2009), 846-864.
-
(2009)
Inf. Softw. Technol
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
87
-
-
77953120075
-
Verification and Trade-Off Analysis of Security Properties in UML System Models
-
Georg, G., Anastasakis, K., Bordbar, B., Houmb, S.H., Ray, I., Toahchoodee, M.: "Verification and Trade-Off Analysis of Security Properties in UML System Models;" IEEE Trans. Softw. Eng. 36(3), (2010), 338-356.
-
(2010)
IEEE Trans. Softw. Eng
, vol.36
, Issue.3
, pp. 338-356
-
-
Georg, G.1
Anastasakis, K.2
Bordbar, B.3
Houmb, S.H.4
Ray, I.5
Toahchoodee, M.6
-
88
-
-
0036145519
-
Building Software Securely from the Ground Up
-
Ghosh, A.K., Howell, C., Whittaker, J.A.: "Building Software Securely from the Ground Up;" IEEE Softw. 19(1), (2002), 14-16.
-
(2002)
IEEE Softw
, vol.19
, Issue.1
, pp. 14-16
-
-
Ghosh, A.K.1
Howell, C.2
Whittaker, J.A.3
-
89
-
-
37349080248
-
The Tropos Methodology: An Overview
-
In, Kluwer Academic Press
-
Giorgini, P., Kolp, M., Mylopoulos, J., Pistore, M.: "The Tropos Methodology: An Overview;" In Methodologies and Software Engineering for Agent Systems, Kluwer Academic Press, (2004), 89-106.
-
(2004)
Methodologies and Software Engineering for Agent Systems
, pp. 89-106
-
-
Giorgini, P.1
Kolp, M.2
Mylopoulos, J.3
Pistore, M.4
-
90
-
-
23144448551
-
The Tropos Software Development Methodology: Processes, Models and Diagrams
-
In Giunchiglia, F., Odell, J., Weiß, G. (Eds.), Springer, Berlin Heidelberg
-
Giunchiglia, F., Mylopoulos, J., Perini, A.: "The Tropos Software Development Methodology: Processes, Models and Diagrams;" In Giunchiglia, F., Odell, J., Weiß, G. (Eds.), Agent-Oriented Software Engineering III, Springer, Berlin Heidelberg, (2003), 162-173.
-
(2003)
Agent-Oriented Software Engineering III
, pp. 162-173
-
-
Giunchiglia, F.1
Mylopoulos, J.2
Perini, A.3
-
93
-
-
38549162276
-
On the Secure Software Development Process: CLASP and SDL Compared
-
IEEE
-
Gregoire, J., Buyens, K., De Win, B., Scandariato, R., Joosen, W.: "On the Secure Software Development Process: CLASP and SDL Compared;" In Third International Workshop on Software Engineering for Secure Systems (SESS: ICSE Workshops 2007), IEEE, (2007).
-
(2007)
Third International Workshop on Software Engineering for Secure Systems (SESS: ICSE Workshops 2007)
-
-
Gregoire, J.1
Buyens, K.2
Win, B.D.3
Scandariato, R.4
Joosen, W.5
-
94
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
Gritzalis, S., Spinellis, D., Georgiadis, P.: "Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification;" Comput. Commun. 22(8), (1999), 697-709.
-
(1999)
Comput. Commun
, vol.22
, Issue.8
, pp. 697-709
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
95
-
-
73349088987
-
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models
-
In Śle{ogonek}zak, D. et al. (Eds.), Springer, Berlin Heidelberg
-
Gunawan, L.A., Herrmann, P., Kraemer, F.A.: "Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models;" In Śle{ogonek}zak, D. et al. (Eds.), Security Technology, Springer, Berlin Heidelberg, (2009), 72-85.
-
(2009)
Security Technology
, pp. 72-85
-
-
Gunawan, L.A.1
Herrmann, P.2
Kraemer, F.A.3
-
96
-
-
79551530717
-
A tool-supported method for the design and implementation of secure distributed applications
-
In, Madrid, Spain: Springer-Verlag Berlin/Heidelberg
-
Gunawan, L.A., Kraemer, F.A., Herrmann, P.: "A tool-supported method for the design and implementation of secure distributed applications;" In Proceedings of the 3rd International Conference on Engineering Secure Software and Systems (ESSoS), Madrid, Spain: Springer-Verlag Berlin/Heidelberg, (2011), 142-155.
-
(2011)
Proceedings of the 3rd International Conference on Engineering Secure Software and Systems (ESSoS)
, pp. 142-155
-
-
Gunawan, L.A.1
Kraemer, F.A.2
Herrmann, P.3
-
97
-
-
78651452980
-
Towards a Process for Web Services Security
-
In, Miami, FL, INSTICC Press
-
Gutiérrez, C., Fernández-Medina, E., Piattini, M.: "Towards a Process for Web Services Security;" In Proceedings of the 3rd International Workshop on Security in Information Systems (WOSIS), Miami, FL, INSTICC Press, (2005a), 298-308.
-
(2005)
Proceedings of the 3rd International Workshop on Security in Information Systems (WOSIS)
, pp. 298-308
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
98
-
-
77954341505
-
Web services enterprise security architecture: A case study
-
In, Fairfax, VA, USA, ACM
-
Gutiérrez, C., Fernández-Medina, E., Piattini, M.: "Web services enterprise security architecture: a case study;" In Proceedings of the 2nd ACM Workshop On Secure Web Services (SWS), Fairfax, VA, USA, ACM, (2005b), 10-19.
-
(2005)
Proceedings of the 2nd ACM Workshop On Secure Web Services (SWS)
, pp. 10-19
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
99
-
-
38949162568
-
PWSSec: Process for Web Services Security
-
In, Washington, DC, USA: IEEE Computer Society
-
Gutiérrez, C., Fernández-Medina, E., Piattini, M.: "PWSSec: Process for Web Services Security;" In Proceedings of the IEEE International Conference on Web Services. Washington, DC, USA: IEEE Computer Society, (2006), 213-222.
-
(2006)
Proceedings of the IEEE International Conference on Web Services
, pp. 213-222
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
100
-
-
70349473097
-
The practical application of a process for eliciting and designing security in web service systems
-
Gutiérrez, C., Rosado, D.G., Fernández-Medina, E.: "The practical application of a process for eliciting and designing security in web service systems. " Inf. Softw. Technol. 51(12), (2009), 1712-1738.
-
(2009)
Inf. Softw. Technol
, vol.51
, Issue.12
, pp. 1712-1738
-
-
Gutiérrez, C.1
Rosado, D.G.2
Fernández-Medina, E.3
-
101
-
-
57049145562
-
The security architecture of qmail
-
In, Allerton, Illinois
-
Hafiz, M., Johnson, R.E., Afandi, R.: "The security architecture of qmail;" In Proceedings of the 11th Conference on Pattern Language of Programs (PLoP), Allerton, Illinois, (2004).
-
(2004)
Proceedings of the 11th Conference on Pattern Language of Programs (PLoP)
-
-
Hafiz, M.1
Johnson, R.E.2
Afandi, R.3
-
102
-
-
34547107609
-
Organizing security patterns
-
Hafiz, M., Adamczyk, P., Johnson, R.E.: "Organizing security patterns;" IEEE Softw. 24(4), (2007), 52-60.
-
(2007)
IEEE Softw
, vol.24
, Issue.4
, pp. 52-60
-
-
Hafiz, M.1
Adamczyk, P.2
Johnson, R.E.3
-
103
-
-
33750453781
-
SECTET: An extensible framework for the realization of secure inter-organizational workflows
-
Hafner, M., Breu, R., Agreiter, B., Nowak, A.: "SECTET: an extensible framework for the realization of secure inter-organizational workflows;" Internet Res. 16(5), (2006), 491-506.
-
(2006)
Internet Res
, vol.16
, Issue.5
, pp. 491-506
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
104
-
-
73149108190
-
SeAAS-A Reference Architecture for Security Services in SOA
-
Hafner, M., Memon, M., Breu, R.: "SeAAS-A Reference Architecture for Security Services in SOA;" J. Univers. Comput. Sci. 15(15), (2009), 2916-2936.
-
(2009)
J. Univers. Comput. Sci
, vol.15
, Issue.15
, pp. 2916-2936
-
-
Hafner, M.1
Memon, M.2
Breu, R.3
-
106
-
-
40449096402
-
Security Requirements Engineering: A Framework for Representation and Analysis
-
Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: "Security Requirements Engineering: A Framework for Representation and Analysis;" IEEE Trans. Softw. Eng. 34(1), (2008), 133-153.
-
(2008)
IEEE Trans. Softw. Eng
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
107
-
-
42449136587
-
A security engineering process based on patterns
-
In, Regensburg, Germany: IEEE Computer Society
-
Hatebur, D., Heisel, M., Schmidt, H.: "A security engineering process based on patterns;" In Procs. of the 18th International Workshop on Database and Expert Systems Applications, Regensburg, Germany: IEEE Computer Society, (2007), 734-738.
-
(2007)
Procs. of the 18th International Workshop on Database and Expert Systems Applications
, pp. 734-738
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
108
-
-
34548181856
-
A Pattern System for Security Requirements Engineering
-
IEEE Computer Society
-
Hatebur, D., Heisel, M., Schmidt, H.: "A Pattern System for Security Requirements Engineering;" In Procs of the 2nd International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society, (2007), 356-365.
-
(2007)
Procs of the 2nd International Conference on Availability, Reliability and Security (ARES)
, pp. 356-365
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
109
-
-
49049087976
-
Analysis and Component-based Realization of Security Requirements
-
In, IEEE
-
Hatebur, D., Heisel, M., Schmidt, H.: "Analysis and Component-based Realization of Security Requirements;" In Procs. of the 3rd International Conference on Availability, Reliability and Security (ARES), IEEE, (2008), 195-203.
-
(2008)
Procs. of the 3rd International Conference on Availability, Reliability and Security (ARES)
, pp. 195-203
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
110
-
-
79955137982
-
Deriving Software Architectures from Problem Descriptions
-
GI
-
Hatebur, D., Heisel, M.: "Deriving Software Architectures from Problem Descriptions;" In Software Engineering 2009-Workshopband, GI, (2009), 383-392.
-
(2009)
Software Engineering 2009-Workshopband
, pp. 383-392
-
-
Hatebur, D.1
Heisel, M.2
-
111
-
-
77956561430
-
A UML profile for requirements analysis of dependable software
-
In, Vienna, Austria: Springer
-
Hatebur, D., Heisel, M.: "A UML profile for requirements analysis of dependable software;" In Proceedings of the 29th International Conference on Computer Safety, Reliability and Security (Safecomp), Vienna, Austria: Springer, (2010), 317-331.
-
(2010)
Proceedings of the 29th International Conference on Computer Safety, Reliability and Security (Safecomp)
, pp. 317-331
-
-
Hatebur, D.1
Heisel, M.2
-
112
-
-
79953186499
-
Systematic Development of UMLsec Design Models Based on Security Requirements
-
In Giannakopoulou, D., Orejas, F. (Eds.), Springer, Berlin Heidelberg
-
Hatebur, Denis, Heisel, M., Jürjens, J., Schmidt, H.: "Systematic Development of UMLsec Design Models Based on Security Requirements;" In Giannakopoulou, D., Orejas, F. (Eds.), Fundamental Approaches to Software Engineering, Springer, Berlin Heidelberg, (2011), 232-246.
-
(2011)
Fundamental Approaches to Software Engineering
, pp. 232-246
-
-
Hatebur, D.1
Heisel, M.2
Jürjens, J.3
Schmidt, H.4
-
113
-
-
18944361987
-
Model checking software architecture specifications in SAM
-
In, Ischia, Italy: ACM
-
He, X., Ding, J., Deng, Y.: "Model checking software architecture specifications in SAM;" In Proceedings of the 14th International Conference on Software Engineering and Knowledge Engineering (SEKE). Ischia, Italy: ACM, (2005), 271-274.
-
(2005)
Proceedings of the 14th International Conference on Software Engineering and Knowledge Engineering (SEKE)
, pp. 271-274
-
-
He, X.1
Ding, J.2
Deng, Y.3
-
114
-
-
85009069580
-
Secure Software Engineering: Learning from the Past to Address Future Challenges
-
Hein, D., Saiedian, H.: "Secure Software Engineering: Learning from the Past to Address Future Challenges;" Inf. Secur. J.: A Global Perspective, 18(1), (2009), 8-25.
-
(2009)
Inf. Secur. J.: A Global Perspective
, vol.18
, Issue.1
, pp. 8-25
-
-
Hein, D.1
Saiedian, H.2
-
116
-
-
77951085619
-
Situational method engineering: State-of-the-art review
-
Henderson-Sellers, B., Ralyté, J.: "Situational method engineering: state-of-the-art review;" J. Univers. Comput. Sci. (J. UCS) 16(3), (2010), 424-478.
-
(2010)
J. Univers. Comput. Sci. (J. UCS)
, vol.16
, Issue.3
, pp. 424-478
-
-
Henderson-Sellers, B.1
Ralyté, J.2
-
117
-
-
38549147623
-
An Analysis of the Security Patterns Landscape
-
Minneapolis, MN: IEEE
-
Heyman, T., Yskout, K., Scandariato, R., Joosen, W.: "An Analysis of the Security Patterns Landscape;" In Procs. 3rd International Workshop on Software Engineering for Secure Systems (SESS: ICSE Workshops 2007). Minneapolis, MN: IEEE, (2007).
-
(2007)
Procs. 3rd International Workshop on Software Engineering for Secure Systems (SESS: ICSE Workshops 2007)
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
-
118
-
-
49049102759
-
Using Security Patterns to Combine Security Metrics
-
Barcelona, Spain: IEEE Computer Society
-
Heyman, T., Scandariato, R., Huygens, C., Joosen, W.: "Using Security Patterns to Combine Security Metrics;" In Procs. of the 7th International Conference on Availability, Reliability and Security (ARES). Barcelona, Spain: IEEE Computer Society, (2008), 1156-1163.
-
(2008)
Procs. of the 7th International Conference on Availability, Reliability and Security (ARES)
, pp. 1156-1163
-
-
Heyman, T.1
Scandariato, R.2
Huygens, C.3
Joosen, W.4
-
120
-
-
84899315800
-
Balancing Security and Performance Properties During System Architectural Design
-
In Mouratidis, H. (Ed.), IGI Global
-
Houmb, S.H., Georg, G., Petriu, D., Bordbar, B., Ray, I., Anastasakis, K., France, R.: "Balancing Security and Performance Properties During System Architectural Design;" In Mouratidis, H. (Ed.), Software Engineering for Secure Systems, IGI Global, (2011), 155-191.
-
(2011)
Software Engineering for Secure Systems
, pp. 155-191
-
-
Houmb, S.H.1
Georg, G.2
Petriu, D.3
Bordbar, B.4
Ray, I.5
Anastasakis, K.6
France, R.7
-
122
-
-
4344674013
-
Agent UML notation for multiagent system design
-
Huget, M.P.: "Agent UML notation for multiagent system design;" IEEE Internet Comput. 8(4), (2004), 63-71.
-
(2004)
IEEE Internet Comput
, vol.8
, Issue.4
, pp. 63-71
-
-
Huget, M.P.1
-
123
-
-
79960579049
-
An MDE approach to software process tailoring
-
In, Waikiki, Honolulu, HI, USA: ACM
-
Hurtado Alegría, J.A., Bastarrica, M.C., Quispe, A., Ochoa, S.F.: "An MDE approach to software process tailoring;" In Proceedings of the 2011 International Conference on Software and Systems Process (ICSSP). Waikiki, Honolulu, HI, USA: ACM, (2011), 43-52.
-
(2011)
Proceedings of the 2011 International Conference on Software and Systems Process (ICSSP)
, pp. 43-52
-
-
Hurtado Alegría, J.A.1
Bastarrica, M.C.2
Quispe, A.3
Ochoa, S.F.4
-
124
-
-
79959907898
-
Model-driven engineering practices in industry
-
In, Waikiki, Honolulu, HI, USA: ACM
-
Hutchinson, J., Rouncefield, M., Whittle, J.: "Model-driven engineering practices in industry;" In Proceeding of the 33rd International Conference on Software Engineering (ICSE), Waikiki, Honolulu, HI, USA: ACM, (2011), 633-642.
-
(2011)
Proceeding of the 33rd International Conference on Software Engineering (ICSE)
, pp. 633-642
-
-
Hutchinson, J.1
Rouncefield, M.2
Whittle, J.3
-
126
-
-
49049100941
-
Covering Your Assets in Software Engineering
-
In, Barcelona, Spain: IEEE Computer Society
-
Jaatun, M.G., Tøndel, I.A.: "Covering Your Assets in Software Engineering;" In Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES), Barcelona, Spain: IEEE Computer Society, (2008), 1172-1179.
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES)
, pp. 1172-1179
-
-
Jaatun, M.G.1
Tøndel, I.A.2
-
127
-
-
77953994994
-
An aspect-oriented approach to securing distributed systems
-
In, ACM
-
Jakob, H., Loriant, N., Consel, C.: "An aspect-oriented approach to securing distributed systems;" In Proceedings of the 2009 International Conference on Pervasive Services. ACM, (2009), 21-30.
-
(2009)
Proceedings of the 2009 International Conference on Pervasive Services
, pp. 21-30
-
-
Jakob, H.1
Loriant, N.2
Consel, C.3
-
128
-
-
40249101754
-
The security of applications: Not all are created equal
-
@stake, Available at [Accessed 24 Mar 2011]
-
Jaquith, A.: "The security of applications: Not all are created equal;" Research Report, @stake, (2002), 1-12. Available at [Accessed 24 Mar 2011]: http://www.securitymanagement.com/archive/library/atstake_tech0502.pdf
-
(2002)
Research Report
, pp. 1-12
-
-
Jaquith, A.1
-
129
-
-
36248951815
-
Software engineering for secure software-state of the art: A survey
-
Purdue University, West Lafayette
-
Jayaram, K., Mathur, A.P.: "Software engineering for secure software-state of the art: A survey;" CERIAS Tech. Report 2005-67, Purdue University, West Lafayette, (2005).
-
(2005)
CERIAS Tech. Report 2005-67
-
-
Jayaram, K.1
Mathur, A.P.2
-
130
-
-
0003062036
-
An agent-based approach for building complex software systems
-
Jennings, N.R.: "An agent-based approach for building complex software systems;" Commun. ACM 44(4), (2001), 35-41.
-
(2001)
Commun. ACM
, vol.44
, Issue.4
, pp. 35-41
-
-
Jennings, N.R.1
-
132
-
-
57349117128
-
A SIP-Based Programming Framework for Advanced Telephony Applications
-
In Schulzrinne, H., State, R., Niccolini, S. (Eds.), Springer, Berlin Heidelberg
-
Jouve, W., Palix, N., Consel, C., Kadionik, P.: "A SIP-Based Programming Framework for Advanced Telephony Applications;" In Schulzrinne, H., State, R., Niccolini, S. (Eds.), Services and Security for Next Generation Networks (IPTComm 2008), Springer, Berlin Heidelberg, (2008), 1-20.
-
(2008)
Services and Security for Next Generation Networks (IPTComm 2008)
, pp. 1-20
-
-
Jouve, W.1
Palix, N.2
Consel, C.3
Kadionik, P.4
-
135
-
-
42449093736
-
Towards Using Security Patterns in Model-based System Development
-
In, Kloster Irsee, Germany
-
Jürjens, J., Popp, G., Wimmel, G.: "Towards Using Security Patterns in Model-based System Development;" In Procs. of EuroPLoP 2002, Kloster Irsee, Germany, (2002).
-
(2002)
Procs. of EuroPLoP 2002
-
-
Jürjens, J.1
Popp, G.2
Wimmel, G.3
-
137
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
In, St. Louis, MO, USA ACM
-
Jürjens, J.: "Sound methods and effective tools for model-based security engineering with UML;" In Proceedings of the 27th International Conference on Software Engineering (ICSE), St. Louis, MO, USA ACM, (2005), 322-331.
-
(2005)
Proceedings of the 27th International Conference on Software Engineering (ICSE)
, pp. 322-331
-
-
Jürjens, J.1
-
138
-
-
33749646163
-
Model-Based Security Engineering with UML: Introducing Security Aspects
-
In Boer, F.S. et al. (Eds.), Springer, Berlin Heidelberg
-
Jürjens, J.: "Model-Based Security Engineering with UML: Introducing Security Aspects;" In Boer, F.S. et al. (Eds.), Formal Methods for Components and Objects, Springer, Berlin Heidelberg, (2006), 64-87.
-
(2006)
Formal Methods for Components and Objects
, pp. 64-87
-
-
Jürjens, J.1
-
139
-
-
33749391615
-
Model-Based Security Engineering for Real
-
In Misra, J., Nipkow, T., Sekerinski, E. (Eds.), Springer, Berlin Heidelberg
-
Jürjens, J.: "Model-Based Security Engineering for Real;" In Misra, J., Nipkow, T., Sekerinski, E. (Eds.), FM 2006: Formal Methods, Springer, Berlin Heidelberg, (2006), 600-606.
-
(2006)
FM 2006: Formal Methods
, pp. 600-606
-
-
Jürjens, J.1
-
140
-
-
47249142498
-
Automated analysis of permission-based security using UMLsec
-
In, Budapest, Hungary: Springer-Verlag
-
Jürjens, J., Schreck, J., Yu, Y.: "Automated analysis of permission-based security using UMLsec;" In Proceedings of the Theory and Practice of Software (ETAPS), 11th International Conference on Fundamental Approaches to Software Engineering (FASE), Budapest, Hungary: Springer-Verlag, (2008), 292-295.
-
(2008)
Proceedings of the Theory and Practice of Software (ETAPS), 11th International Conference on Fundamental Approaches to Software Engineering (FASE)
, pp. 292-295
-
-
Jürjens, J.1
Schreck, J.2
Yu, Y.3
-
141
-
-
84874759719
-
Security and Dependability Engineering
-
In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Boston, MA: Springer Verlag
-
Jürjens, J.: "Security and Dependability Engineering;" In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Security and Dependability for Ambient Intelligence, Boston, MA: Springer Verlag, (2009), 21-36.
-
(2009)
Security and Dependability for Ambient Intelligence
, pp. 21-36
-
-
Jürjens, J.1
-
142
-
-
79952916356
-
Model-Driven Development Meets Security: An Evaluation of Current Approaches
-
In, Kauai, HI, USA: IEEE
-
Kasal, K., Heurix, J., Neubauer, T.: "Model-Driven Development Meets Security: An Evaluation of Current Approaches;" In Procs. of the 44th Hawaii International Conference on System Sciences (HICSS). Kauai, HI, USA: IEEE, (2011), 1-9.
-
(2011)
Procs. of the 44th Hawaii International Conference on System Sciences (HICSS)
, pp. 1-9
-
-
Kasal, K.1
Heurix, J.2
Neubauer, T.3
-
143
-
-
84874786207
-
SECTET-Model driven Security of Service Oriented Systems based on Security-as-a-Service
-
In, Tokyo, Japan,. Available at, (Accessed 2011)
-
Katt, B., Breu, R., Memon, M., Hafner, M.: "SECTET-Model driven Security of Service Oriented Systems based on Security-as-a-Service;" In Presentation in Japan-Austria Joint Workshop on "ICT, " October 18-19, Tokyo, Japan, (2010). Available at: http://www.jst.go.jp/sicp/ws2010_austria/presentation/presentation_05.pdf (Accessed 2011)
-
(2010)
Presentation in Japan-Austria Joint Workshop on "ICT, " October 18-19
-
-
Katt, B.1
Breu, R.2
Memon, M.3
Hafner, M.4
-
144
-
-
80455147712
-
A Survey on Requirements and Design Methods for Secure Software Development
-
Queen's University, Kingston, Ontario, Canada,. Available at:, (Accessed: December 2010)
-
Khan, M.U.A., Zulkernine, M.: "A Survey on Requirements and Design Methods for Secure Software Development;" Technical Report No. 2009-562, School of Computing, Queen's University, Kingston, Ontario, Canada, (2009). Available at: http://research.cs.queensu.ca/TechReports/Reports/2009-562.pdf (Accessed: December 2010).
-
(2009)
Technical Report No. 2009-562, School of Computing
-
-
Khan, M.U.A.1
Zulkernine, M.2
-
145
-
-
35248828504
-
Aspect-oriented programming
-
In Akşit, M., Matsuoka, S. (Eds.), LNCS 1241, Springer, Berlin Heidelberg
-
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: "Aspect-oriented programming;" In Akşit, M., Matsuoka, S. (Eds.), ECOOP'97-Object-Oriented Programming, LNCS 1241, Springer, Berlin Heidelberg, (1997), 220-242.
-
(1997)
ECOOP'97-Object-Oriented Programming
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
146
-
-
70350663534
-
Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks
-
Norwegian University of Science and Technology
-
Kraemer, F.A.: "Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks;" PhD Thesis, Norwegian University of Science and Technology, (2008).
-
(2008)
PhD Thesis
-
-
Kraemer, F.A.1
-
147
-
-
71749097369
-
Tool support for the rapid composition, analysis and implementation of reactive services
-
Kraemer, F.A., Slåtten, V., Herrmann, P.: "Tool support for the rapid composition, analysis and implementation of reactive services;" J. Syst. Softw. 82(12), (2009), 2068-2080.
-
(2009)
J. Syst. Softw
, vol.82
, Issue.12
, pp. 2068-2080
-
-
Kraemer, F.A.1
Slåtten, V.2
Herrmann, P.3
-
148
-
-
2642577484
-
A Flexible, Model-Driven Security Framework for Distributed Systems
-
New York, USA
-
Lang, U., Schreiner, R.: "A Flexible, Model-Driven Security Framework for Distributed Systems;" In Proceedings of the IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), New York, USA, (2003).
-
(2003)
Proceedings of the IASTED International Conference on Communication, Network, and Information Security (CNIS 2003)
-
-
Lang, U.1
Schreiner, R.2
-
150
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
In, Dresden, Germany, Springer
-
Lodderstedt, T., Basin, D., Doser, J.: "SecureUML: A UML-based modeling language for model-driven security;" In UML 2002-The Unified Modeling Language: 5th International Conference, Dresden, Germany, Springer, (2002), 426-441.
-
(2002)
UML 2002-The Unified Modeling Language: 5th International Conference
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
151
-
-
26844531710
-
Model driven security from UML Models to Access Control Architectures
-
University of Freiburg, Germany,. Available at
-
Lodderstedt, T.: "Model driven security from UML Models to Access Control Architectures;" PhD Thesis, University of Freiburg, Germany, (2003). Available at: http://www.freidok.uni-freiburg.de/volltexte/1253/
-
(2003)
PhD Thesis
-
-
Lodderstedt, T.1
-
152
-
-
77956382145
-
Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology
-
Low, G., Mouratidis, H., Henderson-Sellers, B.: "Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology;" J. Object Technol. 9(4), (2010), 93-125.
-
(2010)
J. Object Technol
, vol.9
, Issue.4
, pp. 93-125
-
-
Low, G.1
Mouratidis, H.2
Henderson-Sellers, B.3
-
153
-
-
84892822999
-
-
Berlin, Heidelberg: Springer Berlin Heidelberg
-
Lund, M.S., Solhaug, B., Stølen, K.: "Model-Driven Risk Analysis;" Berlin, Heidelberg: Springer Berlin Heidelberg, (2011).
-
(2011)
Model-Driven Risk Analysis
-
-
Lund, M.S.1
Solhaug, B.2
Stølen, K.3
-
154
-
-
84874786392
-
Towards Secure Ambient Intelligence Scenarios
-
In, San Francisco, CA
-
Maña, A., Sánchez-Cid, F., Serrano, D., Muñoz, A.: "Towards Secure Ambient Intelligence Scenarios;" In Proceedings of the 18th International Conference on Software Engineering, Knowledge Engineering (SEKE), San Francisco, CA, (2006), 386-391.
-
(2006)
Proceedings of the 18th International Conference on Software Engineering, Knowledge Engineering (SEKE)
, pp. 386-391
-
-
Maña, A.1
Sánchez-Cid, F.2
Serrano, D.3
Muñoz, A.4
-
155
-
-
49049090201
-
Towards Formal Specification of Abstract Security Properties
-
In, Washington, DC, USA: IEEE Computer Society
-
Maña, A., Pujol, G.: "Towards Formal Specification of Abstract Security Properties;" In Proceedings of the 3rd International Conference on Availability, Reliability and Security, Washington, DC, USA: IEEE Computer Society, (2008), 80-87.
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security
, pp. 80-87
-
-
Maña, A.1
Pujol, G.2
-
156
-
-
2342469291
-
Software security
-
McGraw, G.: "Software security;" IEEE Security & Privacy 2(2), (2004), 80-83.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.2
, pp. 80-83
-
-
McGraw, G.1
-
158
-
-
17644399286
-
Tool Support for Aspect-Oriented Design
-
In Bruel, J.-M., Bellahsene, Z. (Eds.), Springer, Berlin Heidelberg
-
Mekerke, F., Georg, G., France, R.: "Tool Support for Aspect-Oriented Design;" In Bruel, J.-M., Bellahsene, Z. (Eds.), Advances in Object-Oriented Information Systems, Springer, Berlin Heidelberg, (2002), 280-289.
-
(2002)
Advances in Object-Oriented Information Systems
, pp. 280-289
-
-
Mekerke, F.1
Georg, G.2
France, R.3
-
159
-
-
49049101701
-
Secure software design in practice
-
In, IEEE
-
Meland, P.H., Jensen, J.: "Secure software design in practice;" In Procs. of the 3rd International Conference on Availability, Reliability and Security (ARES). IEEE, (2008), 1164-1171.
-
(2008)
Procs. of the 3rd International Conference on Availability, Reliability and Security (ARES)
, pp. 1164-1171
-
-
Meland, P.H.1
Jensen, J.2
-
160
-
-
84885581113
-
SECTISSIMO: A Platformindependent Framework for Security Services
-
In, Toulouse, France
-
Memon, M., Hafner, M., Breu, R.: "SECTISSIMO: A Platformindependent Framework for Security Services;" In Modeling Security Workshop In Association with MODELS 2008, Toulouse, France, (2008).
-
(2008)
Modeling Security Workshop In Association with MODELS 2008
-
-
Memon, M.1
Hafner, M.2
Breu, R.3
-
162
-
-
74049100459
-
A Security Meta-model for Service-Oriented Architectures
-
In, IEEE
-
Menzel, M., Meinel, C.: "A Security Meta-model for Service-Oriented Architectures;" In Procs. of the 2009 IEEE International Conference on Services Computing (SCC), IEEE, (2009), 251-259.
-
(2009)
Procs. of the 2009 IEEE International Conference on Services Computing (SCC)
, pp. 251-259
-
-
Menzel, M.1
Meinel, C.2
-
163
-
-
70349683196
-
Security Requirements Specification in Service-Oriented Business Process Management
-
In, IEEE
-
Menzel, M., Thomas, I., Meinel, C.: "Security Requirements Specification in Service-Oriented Business Process Management;" In Procs. of the 2009 International Conference on Availability, Reliability and Security (ARES), IEEE, (2009), 41-48.
-
(2009)
Procs. of the 2009 International Conference on Availability, Reliability and Security (ARES)
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
164
-
-
77957910803
-
SecureSOA
-
In, IEEE Computer Society
-
Menzel, M., Meinel, C.: "SecureSOA;" In Procs. of the 2010 IEEE International Conference on Services Computing, IEEE Computer Society, (2010), 146-153.
-
(2010)
Procs. of the 2010 IEEE International Conference on Services Computing
, pp. 146-153
-
-
Menzel, M.1
Meinel, C.2
-
165
-
-
77957265737
-
A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures
-
IEEE
-
Menzel, M., Warschofsky, R., Meinel, C.: "A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures;" In Procs. of the 2010 IEEE International Conference on Web Services, IEEE, (2010), 243-250.
-
(2010)
Procs. of the 2010 IEEE International Conference on Web Services
, pp. 243-250
-
-
Menzel, M.1
Warschofsky, R.2
Meinel, C.3
-
166
-
-
0037880329
-
Peer-to-Peer Computing
-
HP Labs
-
Milojicic, D.S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.: "Peer-to-Peer Computing;" Technical Report, HPL-2002-57, HP Labs, (2002).
-
(2002)
Technical Report, HPL-2002-57
-
-
Milojicic, D.S.1
Kalogeraki, V.2
Lukose, R.3
Nagaraja, K.4
Pruyne, J.5
Richard, B.6
Rollins, S.7
Xu, Z.8
-
167
-
-
0030643872
-
Secure software architectures
-
In, IEEE
-
Moriconi, M., Qian, X., Riemenschneider, R.A., Gong, L.: "Secure software architectures;" In Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE, (1997), 84-93.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 84-93
-
-
Moriconi, M.1
Qian, X.2
Riemenschneider, R.A.3
Gong, L.4
-
168
-
-
77952736199
-
Weaving security aspects into UML 2.0 design models
-
In, Charlottesville, Virginia, USA: ACM
-
Mouheb, D., Talhi, C., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: "Weaving security aspects into UML 2.0 design models;" In Proceedings of the 13th Workshop on Aspect-Oriented Modeling, Charlottesville, Virginia, USA: ACM, (2009), 7-12.
-
(2009)
Proceedings of the 13th Workshop on Aspect-Oriented Modeling
, pp. 7-12
-
-
Mouheb, D.1
Talhi, C.2
Lima, V.3
Debbabi, M.4
Wang, L.5
Pourzandi, M.6
-
169
-
-
77952699852
-
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML
-
In Lee, R. et al. (Eds.), Springer, Berlin Heidelberg
-
Mouheb, D., Talhi, C., Nouh, M., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: "Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML;" In Lee, R. et al. (Eds.), Software Engineering Research, Management and Applications 2010, Springer, Berlin Heidelberg, (2010), 197-213.
-
(2010)
Software Engineering Research, Management and Applications 2010
, pp. 197-213
-
-
Mouheb, D.1
Talhi, C.2
Nouh, M.3
Lima, V.4
Debbabi, M.5
Wang, L.6
Pourzandi, M.7
-
171
-
-
77952349147
-
Analysing Security in Information Systems
-
In, Porto, Portugal
-
Mouratidis, H., Giorgini, P.: "Analysing Security in Information Systems;" In Procs. of the 2nd International Workshop on Security In Information Systems (WOSIS), Porto, Portugal, (2004).
-
(2004)
Procs. of the 2nd International Workshop on Security In Information Systems (WOSIS)
-
-
Mouratidis, H.1
Giorgini, P.2
-
172
-
-
23944475544
-
When security meets software engineering: A case of modelling secure information systems
-
Mouratidis, H., Giorgini, P., Manson, G.: "When security meets software engineering: a case of modelling secure information systems;" Inf. Syst. 30(8), (2005), 609-629.
-
(2005)
Inf. Syst
, vol.30
, Issue.8
, pp. 609-629
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
174
-
-
33745804721
-
Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns
-
Mouratidis, H., Weiss, M., Giorgini, P.: "Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns;" Int. J. Softw. Eng. Knowl. Eng. 16(4), (2006), 471-498.
-
(2006)
Int. J. Softw. Eng. Knowl. Eng
, vol.16
, Issue.4
, pp. 471-498
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
175
-
-
33746038490
-
Towards a Comprehensive Framework for Secure Systems Development
-
In Dubois, E., Pohl, K. (Eds.), Springer, Berlin Heidelberg
-
Mouratidis, H., Jürjens, J., Fox, J.: "Towards a Comprehensive Framework for Secure Systems Development;" In Dubois, E., Pohl, K. (Eds.), Advanced Information Systems Engineering, Springer, Berlin Heidelberg, (2006), 48-62.
-
(2006)
Advanced Information Systems Engineering
, pp. 48-62
-
-
Mouratidis, H.1
Jürjens, J.2
Fox, J.3
-
177
-
-
34249004734
-
Secure Tropos: A Security-Oriented Extension of the Tropos methodology
-
Mouratidis, H., Giorgini, P.: "Secure Tropos: A Security-Oriented Extension of the Tropos methodology;" Int. J. Softw. Eng. Knowl. Eng. 17(2), (2007), 285-309.
-
(2007)
Int. J. Softw. Eng. Knowl. Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
178
-
-
34548508691
-
Security Attack Testing (SAT)--testing the security of information systems at design time
-
Mouratidis, H., Giorgini, P.: "Security Attack Testing (SAT)--testing the security of information systems at design time;" Inf. Syst. 32(8), (2007), 1166-1183.
-
(2007)
Inf. Syst
, vol.32
, Issue.8
, pp. 1166-1183
-
-
Mouratidis, H.1
Giorgini, P.2
-
179
-
-
79959571738
-
Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems
-
Mouratidis, H.: "Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems;" Int. J. Comput. Sci. Secur. 3(3), (2009), 241-271.
-
(2009)
Int. J. Comput. Sci. Secur
, vol.3
, Issue.3
, pp. 241-271
-
-
Mouratidis, H.1
-
180
-
-
77954504239
-
From Goal-Driven Security Requirements Engineering to Secure Design
-
Mouratidis, H., Jürjens, J.: "From Goal-Driven Security Requirements Engineering to Secure Design;" Int. J. Intell. Syst. 25(8), (2010), 813-840.
-
(2010)
Int. J. Intell. Syst
, vol.25
, Issue.8
, pp. 813-840
-
-
Mouratidis, H.1
Jürjens, J.2
-
181
-
-
79953033529
-
Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)
-
Mouratidis, H.: "Secure Software Systems Engineering: The Secure Tropos Approach" (Invited Paper); J. Softw. 6(3), (2011), 331-339.
-
(2011)
J. Softw
, vol.6
, Issue.3
, pp. 331-339
-
-
Mouratidis, H.1
-
182
-
-
70450244820
-
Threat Modeling as a Basis for Security Requirements
-
In, ACM Press
-
Myagmar, S., Lee, A., Yurcik, W.: "Threat Modeling as a Basis for Security Requirements;" In Proceedings of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS). ACM Press, (2005), 94-102.
-
(2005)
Proceedings of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS)
, pp. 94-102
-
-
Myagmar, S.1
Lee, A.2
Yurcik, W.3
-
183
-
-
16244391473
-
Security architecture for heterogeneous distributed computing systems
-
In, IEEE
-
Naqvi, S., Riguidel, M.: "Security architecture for heterogeneous distributed computing systems;" In Procs. of the 38th Annual International Carnahan Conference on Security Technology, IEEE, (2004), 34-41.
-
(2004)
Procs. of the 38th Annual International Carnahan Conference on Security Technology
, pp. 34-41
-
-
Naqvi, S.1
Riguidel, M.2
-
184
-
-
60849113797
-
A model-driven approach to architecting secure software
-
In, Boston, USA
-
Oladimeji, E.A., Supakkul, S., Chung, L.: "A model-driven approach to architecting secure software;" In Proceedings of the International Conference on Software Engineering and Knowledge Engineering, Boston, USA, (2007), 535-551.
-
(2007)
Proceedings of the International Conference on Software Engineering and Knowledge Engineering
, pp. 535-551
-
-
Oladimeji, E.A.1
Supakkul, S.2
Chung, L.3
-
186
-
-
84944683046
-
Security-Critical System Development with Extended Use Cases
-
In, IEEE Computer Society
-
Popp, G., Jürjens, J., Wimmel, G., Breu, R.: "Security-Critical System Development with Extended Use Cases;" In Proceedings of the 10th Asia-Pacific Software Engineering Conference Software Engineering Conference (APSEC), IEEE Computer Society, (2003), 478-487.
-
(2003)
Proceedings of the 10th Asia-Pacific Software Engineering Conference Software Engineering Conference (APSEC)
, pp. 478-487
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
187
-
-
39849109816
-
Process-centered review of object oriented software development methodologies
-
Ramsin, R., Paige, R.F.: "Process-centered review of object oriented software development methodologies;" ACM Comput. Surv. 40(1), (2008), 1-89.
-
(2008)
ACM Comput. Surv
, vol.40
, Issue.1
, pp. 1-89
-
-
Ramsin, R.1
Paige, R.F.2
-
188
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
Ray, I., France, R., Na, L., Georg, G.: "An aspect-based approach to modeling access control concerns;" Inf. Softw. Technol. 46(9), (2004), 575-587.
-
(2004)
Inf. Softw. Technol
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.2
Na, L.3
Georg, G.4
-
189
-
-
34548650530
-
Directives for Composing Aspect-Oriented Design Class Models
-
In Rashid, A., Aksit, M. (Eds.), Springer, Berlin Heidelberg, [Reddy et al. 2006]
-
Reddy, Y.R., Ghosh, S., France, R.B., Straw, G., Bieman, J.M., McEachen, N., Song, E., Georg, G.: "Directives for Composing Aspect-Oriented Design Class Models;" In Rashid, A., Aksit, M. (Eds.), Transactions on Aspect-Oriented Software Development I, Springer, Berlin Heidelberg, (2006), 75-105.
-
(2006)
Transactions on Aspect-Oriented Software Development I
, pp. 75-105
-
-
Reddy, Y.R.1
Ghosh, S.2
France, R.B.3
Straw, G.4
Bieman, J.M.5
McEachen, N.6
Song, E.7
Georg, G.8
-
190
-
-
84885653262
-
A Secure Software Architecture Description Language
-
In, Long Beach, California, USA
-
Ren, J., Taylor, R.N.: "A Secure Software Architecture Description Language;" In Procs. of the Workshop on Software Security Assurance Tools, Techniques, and Metrics, in conjunction with the 20th IEEE/ACM Int. Conf. on Automated Software Engineering. Long Beach, California, USA, (2005).
-
(2005)
Procs. of the Workshop on Software Security Assurance Tools, Techniques, and Metrics, in conjunction with the 20th IEEE/ACM Int. Conf. on Automated Software Engineering
-
-
Ren, J.1
Taylor, R.N.2
-
191
-
-
84977598117
-
Towards an architectural treatment of software security: A connector-centric approach
-
Ren, J., Taylor, R., Dourish, P., Redmiles, D.: "Towards an architectural treatment of software security: a connector-centric approach;" ACM SIGSOFT Softw. Eng. Notes 30(4), (2005), 1-7.
-
(2005)
ACM SIGSOFT Softw. Eng. Notes
, vol.30
, Issue.4
, pp. 1-7
-
-
Ren, J.1
Taylor, R.2
Dourish, P.3
Redmiles, D.4
-
192
-
-
78049348655
-
A Connector-Centric Approach to Architectural Access Control
-
University of California Irvine
-
Ren, Jie: "A Connector-Centric Approach to Architectural Access Control;" PhD Thesis, University of California Irvine, (2006).
-
(2006)
PhD Thesis
-
-
Ren, J.1
-
193
-
-
34147146459
-
Model Driven Development of Security Aspects
-
Reznik, J., Ritter, T., Schreiner, R., Lang, U.: "Model Driven Development of Security Aspects;" Electron. Notes Theor. Comput. Sci. 163(2), (2007), 65-79.
-
(2007)
Electron. Notes Theor. Comput. Sci
, vol.163
, Issue.2
, pp. 65-79
-
-
Reznik, J.1
Ritter, T.2
Schreiner, R.3
Lang, U.4
-
194
-
-
84861038500
-
Process Models of SDLCs: Comparison and Evolution
-
In M.R. Syed, S.N. Syed (Eds.), IGI Global
-
Rodriguez, L.C., Mora, M., Vergas-Martin, M., O'Connor, R., Alvarez, F.: "Process Models of SDLCs: Comparison and Evolution;" In M.R. Syed, S.N. Syed (Eds.), Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, IGI Global, (2009), 76-89.
-
(2009)
Handbook of Research on Modern Systems Analysis and Design Technologies and Applications
, pp. 76-89
-
-
Rodriguez, L.C.1
Mora, M.2
Vergas-Martin, M.3
O'Connor, R.4
Alvarez, F.5
-
195
-
-
84874787871
-
Integrating Threat Modeling in Secure Agent-Oriented Software Development
-
Rojas, D.M., Mahdy, A.M.: "Integrating Threat Modeling in Secure Agent-Oriented Software Development;" Int. J. Softw. Eng. 2(3), (2011), 23-36.
-
(2011)
Int. J. Softw. Eng
, vol.2
, Issue.3
, pp. 23-36
-
-
Rojas, D.M.1
Mahdy, A.M.2
-
196
-
-
33750441515
-
Security patterns and requirements for internet-based applications
-
Rosado, D.G., Gutiérrez, C., Fernández-Medina, E., Piattini, M.: "Security patterns and requirements for internet-based applications;" Internet Res. 16(5), (2006), 519-536.
-
(2006)
Internet Res
, vol.16
, Issue.5
, pp. 519-536
-
-
Rosado, D.G.1
Gutiérrez, C.2
Fernández-Medina, E.3
Piattini, M.4
-
197
-
-
49049090612
-
PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices
-
In, IEEE
-
Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: "PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices;" In Procs. of the 3rd International Conference on Availability, Reliability and Security (ARES), IEEE, (2008), 136-143.
-
(2008)
Procs. of the 3rd International Conference on Availability, Reliability and Security (ARES)
, pp. 136-143
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
198
-
-
77949488225
-
Obtaining Security Requirements for a Mobile Grid System
-
Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: "Obtaining Security Requirements for a Mobile Grid System;" Int. J. Grid High Perform. Comput. 1(3), (2009), 1-17.
-
(2009)
Int. J. Grid High Perform. Comput
, vol.1
, Issue.3
, pp. 1-17
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
199
-
-
78650487448
-
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile
-
In Heuser, C., Pernul, G. (Eds.), Springer Berlin/Heidelberg
-
Rosado, D.G., Fernández-Medina, E., López, J.: "Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile;" In Heuser, C., Pernul, G. (Eds.), Advances in Conceptual Modeling-Challenging Perspectives, Springer Berlin/Heidelberg, (2009), 126-136.
-
(2009)
Advances in Conceptual Modeling-Challenging Perspectives
, pp. 126-136
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
200
-
-
77949490964
-
Analysis of Secure Mobile Grid Systems: A Systematic Approach
-
Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: "Analysis of Secure Mobile Grid Systems: A Systematic Approach;" Inf. Softw. Technol. 52(5), (2010), 517-536.
-
(2010)
Inf. Softw. Technol
, vol.52
, Issue.5
, pp. 517-536
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
201
-
-
78650294009
-
Developing a Secure Mobile Grid System through a UML Extension
-
Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: "Developing a Secure Mobile Grid System through a UML Extension;" J. Univers. Comput. Sci. 16(17), (2010), 2333-2352.
-
(2010)
J. Univers. Comput. Sci
, vol.16
, Issue.17
, pp. 2333-2352
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
202
-
-
79952574576
-
Security Services Architecture for Secure Mobile Grid Systems
-
Rosado, D.G., Fernández-Medina, E., López, J.: "Security Services Architecture for Secure Mobile Grid Systems;" J. Syst. Arch. 53(3), (2011), 240-258.
-
(2011)
J. Syst. Arch
, vol.53
, Issue.3
, pp. 240-258
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
203
-
-
79956104662
-
Systematic Design of Secure Mobile Grid Systems
-
Rosado, D.G., Fernández-Medina, E., López, J., Piattini, M.: "Systematic Design of Secure Mobile Grid Systems;" J. Netw. Comput. Appl. 34(4), (2011), 1168-1183.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.4
, pp. 1168-1183
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
204
-
-
15944399929
-
Security in software architecture: A case study
-
In, IEEE
-
Sachitano, A., Chapman, R.O., Hamilton, J.A.: "Security in software architecture: a case study;" In Proceedings of the 5th Annual IEEE SMC Information Assurance Workshop, IEEE, (2004), 370-376.
-
(2004)
Proceedings of the 5th Annual IEEE SMC Information Assurance Workshop
, pp. 370-376
-
-
Sachitano, A.1
Chapman, R.O.2
Hamilton, J.A.3
-
205
-
-
73149125546
-
ModelSec: A Generative Architecture for Model-Driven Security
-
Sánchez, Ó., Molina, F., García-Molina, J., Toval, A.: "ModelSec: A Generative Architecture for Model-Driven Security;" J. Univers. Comput. Sci. 15(15), (2009), 2957-2980.
-
(2009)
J. Univers. Comput. Sci
, vol.15
, Issue.15
, pp. 2957-2980
-
-
Sánchez, O.1
Molina, F.2
García-Molina, J.3
Toval, A.4
-
206
-
-
57849132688
-
SERENITY Pattern-Based Software Development Life-Cycle
-
In, Washington, DC, USA: IEEE Computer Society
-
Sánchez-Cid, F., Maña, A.: "SERENITY Pattern-Based Software Development Life-Cycle;" In Proceedings of the 19th International Conference on Database and Expert Systems Application, Washington, DC, USA: IEEE Computer Society, (2008), 305-309.
-
(2008)
Proceedings of the 19th International Conference on Database and Expert Systems Application
, pp. 305-309
-
-
Sánchez-Cid, F.1
Maña, A.2
-
207
-
-
84874775506
-
Representation of Security and Dependability Solutions
-
In G. Spanoudakis, A. Maña, S. Kokolakis (Eds.), Springer
-
Sánchez-Cid, F., Maña, A., Spanoudakis, G., Serrano, D., Muñoz, A.: "Representation of Security and Dependability Solutions;" In G. Spanoudakis, A. Maña, S. Kokolakis (Eds.), Security and Dependability for Ambient Intelligence, Springer, (2009), 69-96.
-
(2009)
Security and Dependability for Ambient Intelligence
, pp. 69-96
-
-
Sánchez-Cid, F.1
Maña, A.2
Spanoudakis, G.3
Serrano, D.4
Muñoz, A.5
-
208
-
-
84874761088
-
Architecting software with security patterns
-
KU Leuven
-
Scandariato, R., Yskout, K., Heyman, T., Joosen, W.: "Architecting software with security patterns;" CW Reports, volume CW515, Department of Computer Science, KU Leuven, (2008).
-
(2008)
CW Reports, volume CW515, Department of Computer Science
-
-
Scandariato, R.1
Yskout, K.2
Heyman, T.3
Joosen, W.4
-
209
-
-
84976840280
-
Using design patterns to develop reusable object-oriented communication software
-
Schmidt, D.C.: "Using design patterns to develop reusable object-oriented communication software;" Commun, ACM 38, (1995), 65-74.
-
(1995)
Commun, ACM
, vol.38
, pp. 65-74
-
-
Schmidt, D.C.1
-
210
-
-
33344465743
-
Model-Driven Engineering
-
Schmidt, D.C.: "Model-Driven Engineering;" Comput. 39(2), (2006), 25-31.
-
(2006)
Comput
, vol.39
, Issue.2
, pp. 25-31
-
-
Schmidt, D.C.1
-
212
-
-
77952357149
-
Threat-and Risk-Analysis During Early Security Requirements Engineering
-
In, IEEE
-
Schmidt, H.: "Threat-and Risk-Analysis During Early Security Requirements Engineering;" In Procs. of the 5th International Conference on Availability, Reliability, and Security (ARES), IEEE, (2010), 188-195.
-
(2010)
Procs. of the 5th International Conference on Availability, Reliability, and Security (ARES)
, pp. 188-195
-
-
Schmidt, H.1
-
213
-
-
84899214403
-
A Pattern-Based Method to Develop Secure Software
-
In Mouratidis, H. (Ed.), IGI Global
-
Schmidt, H., Hatebur, D., Heisel, M.: "A Pattern-Based Method to Develop Secure Software;" In Mouratidis, H. (Ed.), Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global, (2011), 32-74.
-
(2011)
Software Engineering for Secure Systems: Industrial and Research Perspectives
, pp. 32-74
-
-
Schmidt, H.1
Hatebur, D.2
Heisel, M.3
-
214
-
-
79960296459
-
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec
-
In Mouratidis, H., Rolland, C. (Eds.), Springer
-
Schmidt, H., Jürjens, J.: "Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec;" In Mouratidis, H., Rolland, C. (Eds.), Advanced Information Systems Engineering, Springer, (2011), 367-382.
-
(2011)
Advanced Information Systems Engineering
, pp. 367-382
-
-
Schmidt, H.1
Jürjens, J.2
-
215
-
-
79960340272
-
UMLsec4UML2-adopting UMLsec to support UML2
-
Technical University of Dortmund, Available at
-
Schmidt, H., Jürjens, J.: "UMLsec4UML2-adopting UMLsec to support UML2;" Technical Report 838, Technical University of Dortmund, (2011), Available at: http://hdl.handle.net/2003/27602.
-
(2011)
Technical Report 838
-
-
Schmidt, H.1
Jürjens, J.2
-
218
-
-
74049164526
-
A pattern-driven security advisor for service-oriented architectures
-
ACM Press
-
Schnjakin, M., Menzel, M., Meinel, C.: "A pattern-driven security advisor for service-oriented architectures;" In Proceedings of the 2009 ACM Workshop on Secure Web Services (SWS), ACM Press, (2009), 13-20.
-
(2009)
Proceedings of the 2009 ACM Workshop on Secure Web Services (SWS)
, pp. 13-20
-
-
Schnjakin, M.1
Menzel, M.2
Meinel, C.3
-
219
-
-
84979742193
-
Protection of complex distributed systems
-
In, ACM Press
-
Schreiner, R., Lang, U.: "Protection of complex distributed systems;" In Proceedings of the 2008 Workshop on Middleware Security (MidSec), ACM Press, (2008), 7-12.
-
(2008)
Proceedings of the 2008 Workshop on Middleware Security (MidSec)
, pp. 7-12
-
-
Schreiner, R.1
Lang, U.2
-
221
-
-
33750050331
-
Security Patterns: Integrating Security and Systems Engineering
-
1st ed., Wiley
-
Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: "Security Patterns: Integrating Security and Systems Engineering;" Wiley Series on Software Patterns, 1st ed., Wiley, (2006).
-
(2006)
Wiley Series on Software Patterns
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
222
-
-
84874765622
-
-
SecTro:, Available at, (Accessed 2011)
-
SecTro: "SecTro automated modeling tool;" (2011), Available at: http://sectro.securetropos.org/(Accessed 2011).
-
(2011)
SecTro automated modeling tool
-
-
-
223
-
-
57849110927
-
Towards Precise Security Patterns
-
In, Turin, Italy: IEEE
-
Serrano, D., Maña, A., Sotirious, A.D.: "Towards Precise Security Patterns;" In Procs. of the 19th International Conference on Database and Expert Systems Application (DEXA), Turin, Italy: IEEE, (2008), 287-291.
-
(2008)
Procs. of the 19th International Conference on Database and Expert Systems Application (DEXA)
, pp. 287-291
-
-
Serrano, D.1
Maña, A.2
Sotirious, A.D.3
-
224
-
-
84874768145
-
SERENITY Aware System Development Process
-
In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.)
-
Serrano, D. Maña, A., Llarena, R., Gallego-Nicasio, B., Li, K.: "SERENITY Aware System Development Process;" In Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.), Security and Dependability for Ambient Intelligence, (2009), 165-179.
-
(2009)
Security and Dependability for Ambient Intelligence
, pp. 165-179
-
-
Serrano, D.1
Maña, A.2
Llarena, R.3
Gallego-Nicasio, B.4
Li, K.5
-
225
-
-
70449435047
-
Development of Applications Based on Security Patterns
-
In, Athens, Glyfada, Greece: IEEE
-
Serrano, D., Ruiz, J.F. Muñoz, A., Maña, A., Armenteros, A., Gallego-Nicasio, B.: "Development of Applications Based on Security Patterns;" In Procs. of the 2nd International Conference on Dependability, Athens, Glyfada, Greece: IEEE, (2009), 111-116.
-
(2009)
Procs. of the 2nd International Conference on Dependability
, pp. 111-116
-
-
Serrano, D.1
Ruiz, J.F.2
Muñoz, A.3
Maña, A.4
Armenteros, A.5
Gallego-Nicasio, B.6
-
226
-
-
84947918153
-
Procedure calls are the assembly language of software interconnection: Connectors deserve first-class status
-
In, Springer
-
Shaw, M.: "Procedure calls are the assembly language of software interconnection: Connectors deserve first-class status;" In Studies of Software Design, Springer, (1996), 17-32.
-
(1996)
Studies of Software Design
, pp. 17-32
-
-
Shaw, M.1
-
227
-
-
33947608669
-
Software requirements and architecture modeling for evolving non-secure applications into secure applications
-
Shin, M.E., Gomaa, H.: "Software requirements and architecture modeling for evolving non-secure applications into secure applications;" Sci. Comput. Program. 66(1), (2007), 60-70.
-
(2007)
Sci. Comput. Program
, vol.66
, Issue.1
, pp. 60-70
-
-
Shin, M.E.1
Gomaa, H.2
-
228
-
-
78650643062
-
-
Springer, (Eds.)
-
Spanoudakis, G., Maña, A., Kokolakis, S. (Eds.): "Security and Dependability for Ambient Intelligence;" Springer, (2009).
-
(2009)
Security and Dependability for Ambient Intelligence
-
-
Spanoudakis, G.1
Maña, A.2
Kokolakis, S.3
-
229
-
-
33750490069
-
-
Prentice Hall
-
Steel, C., Nagappan, R., Lai, R.: "Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management;" Prentice Hall, (2005).
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
230
-
-
33646150573
-
Model Composition Directives
-
In Baar, T. et al. (Eds.), In, Springer, Berlin Heidelberg
-
Straw, Greg et al.: "Model Composition Directives;" In Baar, T. et al. (Eds.), In UML 2004-The Unified Modeling Language. Modelling Languages and Applications. Springer, Berlin Heidelberg, (2004), 84-97.
-
(2004)
UML 2004-The Unified Modeling Language. Modelling Languages and Applications
, pp. 84-97
-
-
Straw, G.1
-
232
-
-
77956325951
-
Usability of Security Specification Approaches for UML Design: A Survey
-
Talhi, C., Mouheb, D., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: "Usability of Security Specification Approaches for UML Design: A Survey;" J. Object Technol. 8(6), (2009), 103-122.
-
(2009)
J. Object Technol
, vol.8
, Issue.6
, pp. 103-122
-
-
Talhi, C.1
Mouheb, D.2
Lima, V.3
Debbabi, M.4
Wang, L.5
Pourzandi, M.6
-
233
-
-
70349441583
-
-
Wiley
-
Taylor, R.N., Medvidovic, N., Dashofy, E.M.: "Software Architecture: Foundations, Theory, and Practice;" Wiley, (2010).
-
(2010)
Software Architecture: Foundations, Theory, and Practice
-
-
Taylor, R.N.1
Medvidovic, N.2
Dashofy, E.M.3
-
234
-
-
0035780469
-
Embedding security practices in contemporary information systems development approaches
-
Tryfonas, T., Kiountouzis, E., Poulymenakou, A.: "Embedding security practices in contemporary information systems development approaches;" Inf. Manag. Comput. Secur. 9(4), (2001), 183-197.
-
(2001)
Inf. Manag. Comput. Secur
, vol.9
, Issue.4
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
-
236
-
-
84862283276
-
Securing distributed systems using patterns: A survey
-
Uzunov, A.V., Fernandez, E.B., Falkner, K.: "Securing distributed systems using patterns: A survey;" Comput. Secur. 31(5), (2012), 681-703.
-
(2012)
Comput. Secur
, vol.31
, Issue.5
, pp. 681-703
-
-
Uzunov, A.V.1
Fernandez, E.B.2
Falkner, K.3
-
237
-
-
84874777341
-
-
submitted for publication, (n.d.)
-
Uzunov, A.V., Falkner, K., Fernandez, E.B.: "A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies;" submitted for publication, (n.d.).
-
A Comprehensive Pattern-Oriented Approach to Engineering Security Methodologies
-
-
Uzunov, A.V.1
Falkner, K.2
Fernandez, E.B.3
-
238
-
-
84871373781
-
-
submitted for publication, (n.d.)
-
Uzunov, A.V., Fernandez, E.B., Falkner, K.: "A Software Engineering Approach to Authorization in Distributed, Collaborative Systems using Security Patterns and Security Solution Frames;" submitted for publication, (n.d.).
-
A Software Engineering Approach to Authorization in Distributed, Collaborative Systems using Security Patterns and Security Solution Frames
-
-
Uzunov, A.V.1
Fernandez, E.B.2
Falkner, K.3
-
239
-
-
68149181919
-
A Multi-dimensional Classification for Users of Security Patterns
-
VanHilst, M., Fernandez, E.B., Braz, F.: "A Multi-dimensional Classification for Users of Security Patterns;" J. Res. Pract. Inf. Technol. 41(2), (2009), 87-97.
-
(2009)
J. Res. Pract. Inf. Technol
, vol.41
, Issue.2
, pp. 87-97
-
-
VanHilst, M.1
Fernandez, E.B.2
Braz, F.3
-
240
-
-
68649100902
-
A break in the clouds: Towards a Cloud definition
-
Vaquero-Gonzalez, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: "A break in the clouds: towards a Cloud definition;" ACM SIGCOMM Comput. Commun. Rev. 39(1), (2009), 50-55.
-
(2009)
ACM SIGCOMM Comput. Commun. Rev
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero-Gonzalez, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
241
-
-
19944367288
-
Secure information systems development-a survey and comparison
-
Villarroel, R., Fernández-Medina, E., Piattini, M: "Secure information systems development-a survey and comparison;" Comput. Secur. 24(4), (2005), 308-321.
-
(2005)
Comput. Secur
, vol.24
, Issue.4
, pp. 308-321
-
-
Villarroel, R.1
Fernández-Medina, E.2
Piattini, M.3
-
242
-
-
84855560205
-
Using security patterns to tailor software process
-
In, Miami, FL, USA: Knowledge Systems Institute Graduate School
-
Wagner, R., Fontoura, L.M., Fontoura, A.B.: "Using security patterns to tailor software process;" In Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering (SEKE). Miami, FL, USA: Knowledge Systems Institute Graduate School, (2011), 672-677.
-
(2011)
Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering (SEKE)
, pp. 672-677
-
-
Wagner, R.1
Fontoura, L.M.2
Fontoura, A.B.3
-
243
-
-
73849138269
-
Improving the Classification of Security Patterns
-
Washizaki, H, Fernandez, E.B., Maruyama, K., Kubo, A., Yoshioka, N.: "Improving the Classification of Security Patterns;" In Procs. of the 2009 International Workshop on Database and Expert Systems Applications, (2009), 165-170.
-
(2009)
Procs. of the 2009 International Workshop on Database and Expert Systems Applications
, pp. 165-170
-
-
Washizaki, H.1
Fernandez, E.B.2
Maruyama, K.3
Kubo, A.4
Yoshioka, N.5
-
244
-
-
0034816038
-
A method for designing secure solutions
-
Whitmore, J.J.: "A method for designing secure solutions;" IBM Syst. J. 40(3), (2001), 747-768.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 747-768
-
-
Whitmore, J.J.1
-
245
-
-
84899165292
-
State of Practice in Secure Software: Experts' Views on Best Ways Ahead
-
In Mouratidis, H. (Ed.), IGI Global
-
[Whyte and Harrison 2011] Whyte, B., Harrison, J.: "State of Practice in Secure Software: Experts' Views on Best Ways Ahead;" In Mouratidis, H. (Ed.), Software Engineering for Secure Systems, IGI Global, (2011), 1-14.
-
(2011)
Software Engineering for Secure Systems
, pp. 1-14
-
-
Whyte, B.1
Harrison, J.2
-
246
-
-
0031074051
-
Agent-based software engineering
-
Wooldridge, M.: "Agent-based software engineering;" IEEE Proc. Softw. 144(1), (1997), 26-37.
-
(1997)
IEEE Proc. Softw
, vol.144
, Issue.1
, pp. 26-37
-
-
Wooldridge, M.1
-
248
-
-
49049112097
-
-
CW Reports vol. CW469, Dept. of Computer Science, KU Leuven
-
Yskout, K., Heyman, T., Scandariato, R., Joosen, W.: "A system of security patterns;" CW Reports vol. CW469, Dept. of Computer Science, KU Leuven, (2006).
-
(2006)
A System of Security Patterns
-
-
Yskout, K.1
Heyman, T.2
Scandariato, R.3
Joosen, W.4
-
249
-
-
84874775613
-
-
CW Reports vol. CW514, Dept. of Computer Science, KU Leuven
-
Yskout, K., Heyman, T., Scandariato, R., Joosen, W.: "Security patterns: 10 years later;" CW Reports vol. CW514, Dept. of Computer Science, KU Leuven, (2008).
-
(2008)
Security Patterns: 10 Years Later
-
-
Yskout, K.1
Heyman, T.2
Scandariato, R.3
Joosen, W.4
-
250
-
-
84874785751
-
Formal Software Architecture Design of Secure Distributed Systems
-
Yu, H., He, X., Gao, S., Deng, Y.: "Formal Software Architecture Design of Secure Distributed Systems;" In Proceedings of the 15th International Conference on Software Engineering and Knowledge Engineering (SEKE), (2003), 450-457.
-
(2003)
Proceedings of the 15th International Conference on Software Engineering and Knowledge Engineering (SEKE)
, pp. 450-457
-
-
Yu, H.1
He, X.2
Gao, S.3
Deng, Y.4
-
251
-
-
2942516897
-
A formal approach to designing secure software architectures
-
IEEE Computer Society
-
Yu, H., He, X., Deng, Y., Mo, L.: "A formal approach to designing secure software architectures;" In Procs. of the 8th IEEE International Symposium on High Assurance Systems Engineering (HASE), IEEE Computer Society, (2004), 289-290.
-
(2004)
Procs. of the 8th IEEE International Symposium on High Assurance Systems Engineering (HASE)
, pp. 289-290
-
-
Yu, H.1
He, X.2
Deng, Y.3
Mo, L.4
-
252
-
-
27144493229
-
Secure software architectures design by aspect orientation
-
In, IEEE
-
Yu, H., Liu, D., He, X., Yang, L., Gao, S.: "Secure software architectures design by aspect orientation;" In Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), IEEE, (2005), 47-55.
-
(2005)
Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS)
, pp. 47-55
-
-
Yu, H.1
Liu, D.2
He, X.3
Yang, L.4
Gao, S.5
-
253
-
-
78649302229
-
Cloud computing: State-of-the-art and research challenges
-
Zhang, Q., Cheng, L., Boutaba, R.: "Cloud computing: state-of-the-art and research challenges;" J. Internet Serv. Appl. 1(1), (2010), 7-18.
-
(2010)
J. Internet Serv. Appl
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
|