메뉴 건너뛰기




Volumn 36, Issue 4, 2014, Pages 748-758

Enterprise security pattern: A model-driven architecture instance

Author keywords

Enterprise security architecture; Enterprise security pattern; Model driven architecture; Secure cloud computing; Security pattern

Indexed keywords


EID: 84894243953     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2013.12.009     Document Type: Article
Times cited : (19)

References (21)
  • 2
    • 33745893614 scopus 로고    scopus 로고
    • Federal Agency for Security in Information Technology Germany
    • BSI IT Baseline Protection Manual 2000 Federal Agency for Security in Information Technology Germany
    • (2000) IT Baseline Protection Manual
    • Bsi1
  • 5
    • 84862277578 scopus 로고    scopus 로고
    • Security patterns in practice: Building secure architectures using software patterns
    • Under contract with J. Wiley
    • Fernandez, E.B., Security patterns in practice: building secure architectures using software patterns. To appear in the Wiley Series on Software Design Patterns, Under contract with J. Wiley.
    • To Appear in the Wiley Series on Software Design Patterns
  • 6
    • 84894239351 scopus 로고    scopus 로고
    • Policies and Models
    • Under contract with Addison-Wesley
    • Fernandez, E.B.; Gudes, E.; Olivier, M., Policies and Models. In: The design of secure systems. Under contract with Addison-Wesley.
    • The Design of Secure Systems
  • 7
    • 84865690384 scopus 로고    scopus 로고
    • Two security patterns: Least privilege and security logger/auditor
    • E.B. Fernandez, S. Mujica, and F. Valenzuela Two security patterns: least privilege and security logger/auditor Asian PLoP 2011
    • (2011) Asian PLoP
    • Fernandez, E.B.1    Mujica, S.2    Valenzuela, F.3
  • 8
    • 84894271218 scopus 로고    scopus 로고
    • Retrieved: February, 2013; Available from
    • GIZMODO Fox News' Twitter Account Hacked Retrieved: February, 2013; Available from: http://gizmodo.com/5817870/fox-news-twitter-account-hacked- claims-barack-obama-is-dead
    • Fox News' Twitter Account Hacked
    • Gizmodo1
  • 9
    • 84894264125 scopus 로고    scopus 로고
    • Retrieved: February, 2013; Available from
    • Google Businesses Share their Stories - Google Apps Retrieved: February, 2013; Available from: http://www.google.com/apps/intl/en/customers/index.html
    • Businesses Share Their Stories - Google Apps
    • Google1
  • 16
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • I. Ray, R.B. France, N. Li, and G. Georg An aspect-based approach to modeling access control concerns J. Inf. Softw. Technol. 46 9 July 2004 575 587
    • (2004) J. Inf. Softw. Technol. , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.B.2    Li, N.3    Georg, G.4
  • 19
    • 0142091714 scopus 로고    scopus 로고
    • Turning software into a service
    • M. Turner, D. Budgen, and P. Brereton Turning software into a service Computer 36 10 2003 38 44
    • (2003) Computer , vol.36 , Issue.10 , pp. 38-44
    • Turner, M.1    Budgen, D.2    Brereton, P.3
  • 20
    • 84894231057 scopus 로고    scopus 로고
    • Engineering security into distributed systems: A survey of methodologies
    • Uzunov, A.V.; Fernandez, E.B.; Falkner K., Engineering security into distributed systems: a survey of methodologies. Accepted for the Journal of Universal Computer Science.
    • Accepted for the Journal of Universal Computer Science


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.