메뉴 건너뛰기




Volumn 1, Issue , 2015, Pages 292-302

Do security patterns really help designers?

Author keywords

[No Author keywords available]

Indexed keywords

CURRICULA; DESIGN;

EID: 84951776720     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2015.49     Document Type: Conference Paper
Times cited : (58)

References (20)
  • 4
    • 84862283276 scopus 로고    scopus 로고
    • Securing distributed systems using patterns: A survey
    • A. V. Uzunov, E. B. Fernandez, and K. Falkner, "Securing distributed systems using patterns: A survey," Computers & Security, vol. 31, no. 5, pp. 681-703, 2012.
    • (2012) Computers & Security , vol.31 , Issue.5 , pp. 681-703
    • Uzunov, A.V.1    Fernandez, E.B.2    Falkner, K.3
  • 8
    • 23844500788 scopus 로고    scopus 로고
    • Defect frequency and design patterns: An empirical study of industrial code
    • Dec
    • M. Vokac, "Defect frequency and design patterns: An empirical study of industrial code," Software Engineering, IEEE Transactions on, vol. 30, pp. 904-917, Dec 2004.
    • (2004) Software Engineering, IEEE Transactions on , vol.30 , pp. 904-917
    • Vokac, M.1
  • 10
    • 84867330357 scopus 로고    scopus 로고
    • What do we know about the effectiveness of software design patterns?
    • C. Zhang and D. Budgen, "What do we know about the effectiveness of software design patterns?," Software Engineering, IEEE Transactions on, vol. 38, no. 5, pp. 1213-1231, 2012.
    • (2012) Software Engineering, IEEE Transactions on , vol.38 , Issue.5 , pp. 1213-1231
    • Zhang, C.1    Budgen, D.2
  • 11
    • 84875216131 scopus 로고    scopus 로고
    • A survey of experienced user perceptions about software design patterns
    • May
    • C. Zhang and D. Budgen, "A survey of experienced user perceptions about software design patterns," Information and Software Technology, vol. 55, pp. 822-835, May 2013.
    • (2013) Information and Software Technology , vol.55 , pp. 822-835
    • Zhang, C.1    Budgen, D.2
  • 16
    • 84870713446 scopus 로고    scopus 로고
    • "Companion website." http://people.cs.kuleuven.be/-koen.yskout/icse15.
    • Companion Website.
  • 17
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl, "Eliciting security requirements with misuse cases," Requirements engineering, vol. 10, no. 1, pp. 34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.