Abstract features in feature modeling

T Thum, C Kastner, S Erdweg… - 2011 15th International …, 2011 - ieeexplore.ieee.org
A software product line is a set of program variants, typically generated from a common code
base. Feature models describe variability in product lines by documenting features and their …

Systematic literature review of security pattern research

H Washizaki, T **a, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Vulnerability-based security pattern categorization in search of missing patterns

P Anand, J Ryoo, R Kazman - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
A Security Pattern encapsulates security design expertise that addresses recurring
information security problems in the form of a credentialed solution. It also presents potential …

Automated verification of security pattern compositions

J Dong, T Peng, Y Zhao - Information and Software Technology, 2010 - Elsevier
Software security becomes a critically important issue for software development when more
and more malicious attacks explore the security holes in software systems. To avoid security …

Software-security patterns: degree of maturity

M Bunke - Proceedings of the 20th European Conference on …, 2015 - dl.acm.org
Since Gamma et al. published their design patterns, patterns are very popular in the area of
software engineering. They provide best practice to handle recurring problems during the …

The use of security tactics in open source software projects

J Ryoo, B Malone, PA Laplante… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Despite the best intentions of software architects, it is often the case that individual
developers do not faithfully implement the original security design decisions. Such a …

Security patterns and requirements for internet‐based applications

DG Rosado, C Gutiérrez, E Fernández‐Medina… - Internet …, 2006 - emerald.com
Purpose–The purpose of this paper is that of linking security requirements for web services
with security patterns, both at the architectural and the design level, obtaining in a systematic …

Security assurance aggregation for it infrastructures

N Pham, M Riguidel - 2007 Second International Conference …, 2007 - ieeexplore.ieee.org
In the development of more extensive information systems, IT security becomes increasingly
important. The need for a tool to measure current security assurance level is therefore vital in …

A security property decomposition argument pattern for structured assurance case models

J Jaskolka, A Jawad, J Samuel, B Hamid - Proceedings of the 26th …, 2021 - dl.acm.org
Demonstrating that a system satisfies a complete, adequate, and consistent set of security
requirements to protect its critical assets is an essential aspect of security evaluation and …

Model checking security pattern compositions

J Dong, T Peng, Y Zhao - Seventh International Conference on …, 2007 - ieeexplore.ieee.org
Security patterns capture best practice on secure software design and development. They
document typical solutions to security problems. To ensure security, large software system …