[LIBRO][B] Security engineering with patterns: origins, theoretical models, and new applications

M Schumacher - 2003 - books.google.com
For quite some time, in systems and software design, security only came as a second
thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet …

Secure software development by example

A Apvrille, M Pourzandi - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
When trying to incorporate security into a program, software developers face either too much
theoretical information that they cannot apply or exhaustive and discouraging …

Architectural risk analysis of software systems based on security patterns

ST Halkidis, N Tsantalis… - … on Dependable and …, 2008 - ieeexplore.ieee.org
The importance of software security has been profound, since most attacks to software
systems are based on vulnerabilities caused by poorly designed and developed software …

A pattern system for access control

T Priebe, EB Fernández, JI Mehlau… - Research Directions in …, 2004 - Springer
In order to develop trustworthy information systems, security aspects should be considered
from the early project stages. This is particularly true for authorization and access control …

Securing distributed systems using patterns: A survey

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …

[PDF][PDF] Organizing security patterns related to security and pattern recognition requirements

M Bunke, R Koschke, K Sohr - International Journal on Advances in …, 2012 - iariajournals.org
Software security is an emerging area in software development. More and more
vulnerabilities are published and highlight the endangerment of systems. Hence, software …

Security patterns for voice over ip networks

EB Fernandez, JC Pelaez… - … Multi-Conference on …, 2007 - ieeexplore.ieee.org
Voice over IP (VoIP) has had a strong effect on global communications by allowing human
voice and fax information to travel over existing packet data networks along with traditional …

Best-practice patterns and tool support for configuring secure web services messaging

M Tatsubori, T Imamura… - … Conference on Web …, 2004 - ieeexplore.ieee.org
This paper presents an emerging tool for security configuration of service-oriented
architectures with Web Services. Security is a major concern when implementing mission …

Guiding the selection of security patterns based on security requirements and pattern classification

A Motii, B Hamid, A Lanusse, JM Bruel - Proceedings of the 20th …, 2015 - dl.acm.org
Security pattern-based system and software engineering (PBSE) approaches aim at building
secure software and systems by capturing and reusing artifacts that encapsulate security …

[PDF][PDF] Final technical report: Security patterns for web application development

DM Kienzle, MC Elder - University of Virginia, USA, 2002 - Citeseer
There is a huge disconnect between security professionals and systems developers.
Security professionals are primarily concerned with the security of a system, while …