Patterns for security and privacy in cloud ecosystems
暂无分享,去创建一个
Eduardo B. Fernández | Hironori Washizaki | Nobukazu Yoshioka | H. Washizaki | E. Fernández | Nobukazu Yoshioka
[1] Martin Fowler,et al. Analysis patterns - reusable object models , 1996, Addison-Wesley series in object-oriented software engineering.
[2] James Bret Michael,et al. Atomic-Level Security for Web Applications in a Cloud Environment , 2012, Computer.
[3] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[4] Nils Gruschka,et al. Security and Privacy-Enhancing Multicloud Architectures , 2013, IEEE Transactions on Dependable and Secure Computing.
[5] Bart Jellema,et al. Communications as a cloud service: a new take on telecoms , 2014 .
[6] Eduardo B. Fernández,et al. Abstract security patterns for requirements specification and analysis of secure systems , 2014, WER.
[7] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[8] E. B. Fernandez,et al. A Pattern for Software-as-a-Service in Clouds , 2012, 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom).
[9] Eduardo B. Fernández,et al. Building a security reference architecture for cloud systems , 2016, Requirements Engineering.
[10] Jan Bosch,et al. From software product lines to software ecosystems , 2009, SPLC.
[11] Eduardo B. Fernández,et al. A Multi-Dimensional Classification for Users of Security Patterns , 2008, J. Res. Pract. Inf. Technol..
[12] Paris Avgeriou,et al. Describing, Instantiating and Evaluating a Reference Architecture : A Case Study , 2003 .
[13] Eduardo B. Fernández,et al. An Approach to Model-based Development of Secure and Reliable Systems , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[14] Peter Sommerlad,et al. Pattern-Oriented Software Architecture Volume 1: A System of Patterns , 1996 .
[15] David Bernstein,et al. Intercloud Security Considerations , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[16] Kristian Beckers,et al. A pattern-based method for establishing a cloud-specific information security management system , 2013, Requirements Engineering.
[17] Eduardo Fernandez-Buglioni,et al. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns , 2013 .