Security Patterns Related to Security Requirements
暂无分享,去创建一个
[1] Markus Schumacher,et al. Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.
[2] Mario R. Barbacci,et al. Quality Attribute Workshops (QAWs), Third Edition , 2003 .
[3] Miroslav Kis. Information Security Antipatterns in Software Requirements Engineering , 2002 .
[4] Eduardo B. Fernandez,et al. The Authenticator Pattern , 1999 .
[5] Jay Ramachandran,et al. Designing Security Architecture Solutions , 2002 .
[6] Murray Silverstein,et al. A Pattern Language , 1977 .
[7] Mourad Debbabi,et al. Security Design Patterns: Survey and Evaluation , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[8] Donald Firesmith,et al. Common Concepts Underlying Safety, Security, and Survivability Engineering , 2003 .
[9] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[10] Ricardo Dahab,et al. Tropyc: A Pattern Language for Cryptographic Software , 1998 .
[11] Xiaowen Wang,et al. Supporting Security Sensitive Architecture Design , 2005, QoSA/SOQUA.
[12] Donald Firesmith,et al. Specifying Reusable Security Requirements , 2004, J. Object Technol..
[13] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[14] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .