-
1
-
-
33750050331
-
-
Wiley, December
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering. Wiley, December 2005.
-
(2005)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
3
-
-
42449139876
-
A survey on security patterns
-
N. Yoshioka, H. Washizaki, and K. Maruyama, "A survey on security patterns," Progress in Informatics, vol. 5, no. 5, pp. 35-47, 2008.
-
(2008)
Progress in Informatics
, vol.5
, Issue.5
, pp. 35-47
-
-
Yoshioka, N.1
Washizaki, H.2
Maruyama, K.3
-
4
-
-
84862283276
-
Securing distributed systems using patterns: A survey
-
A. V. Uzunov, E. B. Fernandez, and K. Falkner, "Securing distributed systems using patterns: A survey," Computers & Security, vol. 31, no. 5, pp. 681-703, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.5
, pp. 681-703
-
-
Uzunov, A.V.1
Fernandez, E.B.2
Falkner, K.3
-
6
-
-
84864204974
-
Does organizing security patterns focus architectural choices?
-
IEEE
-
K. Yskout, R. Scandariato, and W. Joosen, "Does organizing security patterns focus architectural choices?," in Software Engineering (ICSE), 2012 34th International Conference on, pp. 617-627, IEEE, 2012.
-
(2012)
Software Engineering (ICSE), 2012 34th International Conference on
, pp. 617-627
-
-
Yskout, K.1
Scandariato, R.2
Joosen, W.3
-
8
-
-
23844500788
-
Defect frequency and design patterns: An empirical study of industrial code
-
Dec
-
M. Vokac, "Defect frequency and design patterns: An empirical study of industrial code," Software Engineering, IEEE Transactions on, vol. 30, pp. 904-917, Dec 2004.
-
(2004)
Software Engineering, IEEE Transactions on
, vol.30
, pp. 904-917
-
-
Vokac, M.1
-
9
-
-
72449129016
-
Impact of the visitor pattern on program comprehension and maintenance
-
IEEE Computer Society
-
S. Jeanmart, Y.-G. Gueheneuc, H. Sahraoui, and N. Habra, "Impact of the visitor pattern on program comprehension and maintenance," in Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement, pp. 69-78, IEEE Computer Society, 2009.
-
(2009)
Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
, pp. 69-78
-
-
Jeanmart, S.1
Gueheneuc, Y.-G.2
Sahraoui, H.3
Habra, N.4
-
10
-
-
84867330357
-
What do we know about the effectiveness of software design patterns?
-
C. Zhang and D. Budgen, "What do we know about the effectiveness of software design patterns?," Software Engineering, IEEE Transactions on, vol. 38, no. 5, pp. 1213-1231, 2012.
-
(2012)
Software Engineering, IEEE Transactions on
, vol.38
, Issue.5
, pp. 1213-1231
-
-
Zhang, C.1
Budgen, D.2
-
11
-
-
84875216131
-
A survey of experienced user perceptions about software design patterns
-
May
-
C. Zhang and D. Budgen, "A survey of experienced user perceptions about software design patterns," Information and Software Technology, vol. 55, pp. 822-835, May 2013.
-
(2013)
Information and Software Technology
, vol.55
, pp. 822-835
-
-
Zhang, C.1
Budgen, D.2
-
13
-
-
33745471209
-
Model driven security: From uml models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt, "Model driven security: From uml models to access control infrastructures," ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 15, no. 1, pp. 39- 91, 2006.
-
(2006)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
14
-
-
84936886921
-
A systematic review of model-driven security
-
Dec
-
P. Nguyen, J. Klein, Y. Le Traon, and M. Kramer, "A systematic review of model-driven security," in 20th Asia-Pacific Software Engineering Conference (APSEC'13), vol. 1, pp. 432-441, Dec 2013.
-
(2013)
20th Asia-Pacific Software Engineering Conference (APSEC'13)
, vol.1
, pp. 432-441
-
-
Nguyen, P.1
Klein, J.2
Le Traon, Y.3
Kramer, M.4
-
15
-
-
80455173460
-
Security in model driven development: A survey
-
IEEE
-
J. Jensen and M. G. Jaatun, "Security in model driven development: A survey," in Availability, Reliability and Security (ARES), 2011 Sixth International Conference on, pp. 704-709, IEEE, 2011.
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
, pp. 704-709
-
-
Jensen, J.1
Jaatun, M.G.2
-
16
-
-
84870713446
-
-
"Companion website." http://people.cs.kuleuven.be/-koen.yskout/icse15.
-
Companion Website.
-
-
-
17
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," Requirements engineering, vol. 10, no. 1, pp. 34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
20
-
-
38549147623
-
An analysis of the security patterns landscape
-
T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, "An analysis of the security patterns landscape," in IEEE Workshop on Software Engineering for Secure Systems (SESS), 2007.
-
(2007)
IEEE Workshop on Software Engineering for Secure Systems (SESS)
-
-
Heyman, T.1
Yskout, K.2
Scandariato, R.3
Joosen, W.4
|