-
1
-
-
0004101993
-
-
Wiley
-
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern-oriented software architecture: A system of patterns (Vol. 1). Wiley.
-
(1996)
Pattern-oriented Software Architecture: A System of Patterns
, vol.1
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
2
-
-
84899204780
-
-
CERT Coordination Center Statistics
-
CERT Coordination Center Statistics. (2005). http://www.cert.org/stats/cert_stats.html
-
(2005)
-
-
-
3
-
-
84899225062
-
Software security testing: Let's get back to basics
-
October, Retrieved from
-
Curphey, M. (2004, October). Software security testing: Let's get back to basics. Software Magazine. Retrieved from http://www.softwaremag.com/L.cfm?Doc=2004-09software-security-testing
-
(2004)
Software Magazine
-
-
Curphey, M.1
-
4
-
-
22544455788
-
Patterns for application firewalls
-
Retrieved from
-
Delessy-Gassant, N., Fernandez, E. B., Rajput, S., & Larrondo-Petrie, M. M. (2004). Patterns for application firewalls. Proceedings of the Pattern Languages of Programs Conference (PLoP2004). Retrieved from http://hillside.net/plop/2004/
-
(2004)
Proceedings of the Pattern Languages of Programs Conference (PLoP2004)
-
-
Delessy-Gassant, N.1
Fernandez, E.B.2
Rajput, S.3
Larrondo-Petrie, M.M.4
-
6
-
-
84860080088
-
Layers and non-functional patterns
-
May 10-15, Phoenix, AZ. Retrieved from
-
Fernandez, E. B. (2003, May 10-15). Layers and non-functional patterns. Proceedings of ChiliPLoP, 2003. Phoenix, AZ. Retrieved from http://hillside.net/chiliplop/2003/
-
(2003)
Proceedings of ChiliPLoP, 2003
-
-
Fernandez, E.B.1
-
11
-
-
78651439663
-
-
Submitted for publication
-
Fernandez, E. B., Larrondo-Petrie, M. M., Sorgente, T., & VanHilst, M. (2006). UML-based access control models. Submitted for publication.
-
(2006)
UML-based Access Control Models
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Vanhilst, M.4
-
12
-
-
33744905133
-
A pattern language for security models
-
Retrieved from
-
Fernandez, E. B., & Pan, R. (2001). A pattern language for security models. Proceedings of PLoP 2001. Retrieved from http://jerry.cs.uiuc.edu/~plop/plop2001/accepted_submissions
-
(2001)
Proceedings of PLoP 2001
-
-
Fernandez, E.B.1
Pan, R.2
-
14
-
-
84899297105
-
Defining security requirements through misuse actions
-
August 20-25, Santiago, Chile
-
Fernandez, E. B., VanHilst, M., Larrondo-Petrie, M. M., & Huang, S. (2006, August 20-25). Defining security requirements through misuse actions. Accepted for hte International Workshop on Advanced Software Engineering (IWASE 2006), Santiago, Chile.
-
(2006)
Accepted For Hte International Workshop On Advanced Software Engineering (IWASE 2006)
-
-
Fernandez, E.B.1
Vanhilst, M.2
Larrondo-Petrie, M.M.3
Huang, S.4
-
15
-
-
78651459564
-
An analysis pattern for reservation and use of entities
-
Retrieved from
-
Fernandez, E. B., & Yuan, X. (1999). An analysis pattern for reservation and use of entities. Proceedings of PLoP99. Retrieved from http://st-www.cs.uiuc.edu/~plop/plop99
-
(1999)
Proceedings of PLoP99
-
-
Fernandez, E.B.1
Yuan, X.2
-
19
-
-
84899188427
-
-
Gramm-Leach-Bliley Act, November, Retrieved from
-
Gramm-Leach-Bliley Act. (1999, November). Senate Banking Committee. Retrieved from http://www.senate.gov/~banking/conf/fincon.pdf
-
(1999)
Senate Banking Committee
-
-
-
23
-
-
84899378029
-
-
HIPAA
-
HIPAA. http://www.hipaa.org
-
-
-
-
27
-
-
33645586196
-
Using security patterns to model and analyze security requirements
-
Konrad, S., Cheng, B. H. C., Campbell, L. A., & Wassermann, R. (2003). Using security patterns to model and analyze security requirements. Proceedings of the International Workshop on Requirements for High Assurance Systems, RHAS'03 (pp. 13-22).
-
(2003)
Proceedings of the International Workshop On Requirements For High Assurance Systems, RHAS'03
, pp. 13-22
-
-
Konrad, S.1
Cheng, B.H.C.2
Campbell, L.A.3
Wassermann, R.4
-
28
-
-
0035049246
-
Security challenges for Enterprise Java in an e-business environment
-
Koved, L., Nadalin, A., Nagarathan, N., Pistoia, M., & Schrader, T. (2001). Security challenges for Enterprise Java in an e-business environment. IBM Systems Journal, 40(1), 130-152.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.1
, pp. 130-152
-
-
Koved, L.1
Nadalin, A.2
Nagarathan, N.3
Pistoia, M.4
Schrader, T.5
-
30
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
September, Monterey, CA
-
Liu, L., Yu, E., & Mylopoulos, J. (2003, September). Security and privacy requirements analysis within a social setting. Proceedings of the International Conference on Requirements Engineering (RE'03), Monterey, CA.
-
(2003)
Proceedings of the International Conference On Requirements Engineering (RE'03)
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
34
-
-
8444240069
-
Using security attack scenarios to analise security during information systems design
-
Mouratidis, H., Giorgini, P., & Manson, G. (2004). Using security attack scenarios to analise security during information systems design. Proceedings of ICEIS 2004.
-
(2004)
Proceedings of ICEIS 2004
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
35
-
-
84976766543
-
The role of software engineering
-
May
-
Neumann, P. G. (1993, May). The role of software engineering. Communications of the ACM, 36(5), 114.
-
(1993)
Communications of the ACM
, vol.36
, Issue.5
, pp. 114
-
-
Neumann, P.G.1
-
36
-
-
84899317731
-
-
The OWASP Testing Project, Retrieved from
-
The OWASP Testing Project. (2004). Retrieved from http://www.modsecurity.org/archive/OWASPTesting_phaseOne.pdf
-
(2004)
-
-
-
38
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
July
-
Ray, I., France, R. B., Li, N., & Georg, G. (2004, July). An aspect-based approach to modeling access control concerns. Journal of Information and Software Technology, 46(9), 575-587.
-
(2004)
Journal of Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
39
-
-
0016555241
-
The protection of information in computer systems
-
Retrieved from
-
Saltzer J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308. Retrieved from http://web.mit.edu/Saltzer/www/publications/protection/index.html
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
40
-
-
84899213066
-
-
Sarbanes-Oxley Act of 2002, January, Retrieved from
-
Sarbanes-Oxley Act of 2002. (2002, January). One Hundred Seventh Congress of the United States of America. Retrieved from http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf
-
(2002)
One Hundred Seventh Congress of the United States of America
-
-
-
41
-
-
0002670359
-
Attack trees
-
December
-
Schneier, B. (1999, December). Attack trees. Dr. Dobb's Journal, 21-29.
-
(1999)
Dr. Dobb's Journal
, pp. 21-29
-
-
Schneier, B.1
-
42
-
-
33646188481
-
-
PhD Thesis, Lecture Notes in Computer Science. LNCS 2754. Springer-Verlag
-
Schumacher, M. (2003). Security engineering with patterns. PhD Thesis, Lecture Notes in Computer Science. LNCS 2754. Springer-Verlag.
-
(2003)
Security Engineering With Patterns
-
-
Schumacher, M.1
-
44
-
-
12344316119
-
-
John Wiley & Sons
-
Schumacher, M., Fernandez, E. B., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security patterns. John Wiley & Sons.
-
(2006)
Security Patterns
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
45
-
-
84888267181
-
Analysis patterns for patient treatment
-
Retrieved from
-
Sorgente, T., & Fernandez, E. B. (2004). Analysis patterns for patient treatment. Proceedings of PLoP 2004. Retrieved from http://jerry.cs.uiuc.cs.uiuc.edu/~plop/plop2004/accepted_submissions
-
(2004)
Proceedings of PLoP 2004
-
-
Sorgente, T.1
Fernandez, E.B.2
-
46
-
-
0036038515
-
Collaborative attack modeling
-
Madrid, Spain. Retrieved from
-
Steffan J., & Schumacher, M. (2002). Collaborative attack modeling. Proceedings of SAC 2002, Madrid, Spain. Retrieved from http://www.ito.tu-darmstadt.de/publs/pdf/sac2002.pdf
-
(2002)
Proceedings of SAC 2002
-
-
Steffan, J.1
Schumacher, M.2
-
47
-
-
84899226193
-
-
Trusted Computing Group, Infrastrcure Work Group. Retrieved from
-
Trusted Computing Group, Infrastrcure Work Group. Retrieved from https://www.trustedcomputinggroup.org/groups/infrastructure
-
-
-
-
49
-
-
0038348212
-
Secure systems development based on the common criteria: The PaIME project
-
November, 2002/FSE-10
-
Vetterling, M., & Wimmel, G. (2002, November) Secure systems development based on the common criteria: The PaIME project. Proceedings of ACM SIGSOFT 2002/FSE-10.
-
(2002)
Proceedings of ACM SIGSOFT
-
-
Vetterling, M.1
Wimmel, G.2
-
50
-
-
85086949764
-
Building security requirements with CLASP
-
May, St. Louis, MO
-
Viega, J. (2005, May). Building security requirements with CLASP. Proceedings of the 2005 Workshop on Software Engineering for Secure Systems & Mdash; Building Trustworthy Applications, SESS'05, St. Louis, MO (pp. 1-7). New York: ACM Press. Retrieved from http://doi.acm.org/10.1145/1083200.1083207
-
(2005)
Proceedings of the 2005 Workshop On Software Engineering For Secure Systems & Mdash; Building Trustworthy Applications, SESS'05
, pp. 1-7
-
-
Viega, J.1
-
53
-
-
0034816038
-
A method for designing secure solutions
-
Retrieved from
-
Whitmore, J. J. (2001). A method for designing secure solutions. IBM Systems Journal, 40(3), 747-768. Retrieved from http://www.research.ibm.com/journal.sj
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 747-768
-
-
Whitmore, J.J.1
-
54
-
-
84899295444
-
An analysis pattern for course management
-
Retrieved from
-
Yuan, X., & Fernandez, E. B. (2003). An analysis pattern for course management. Proceedings of EuroPLoP 2003. Retrieved from http://hillside.net/europlop
-
(2003)
Proceedings of EuroPLoP 2003
-
-
Yuan, X.1
Fernandez, E.B.2
-
55
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
Zuccato, A. (2004). Holistic security requirement engineering for electronic commerce. Computers & Security, 23, 63-76.
-
(2004)
Computers & Security
, vol.23
, pp. 63-76
-
-
Zuccato, A.1
|