Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded Systems
暂无分享,去创建一个
Brahim Hamid | Christian Percebois | Nicolas Desnos | Damien Gouteux | C. Percebois | B. Hamid | Nicolas Desnos | Damien Gouteux
[1] Richard Zurawski,et al. Embedded Systems Handbook , 2004 .
[2] Hironori Washizaki,et al. A survey on security patterns , 2008 .
[3] Amnon H. Eden,et al. LePUS3: An Object-Oriented Design Description Language , 2008, Diagrams.
[4] Jean-Marc Jézéquel,et al. ≪UML≫ 2002 — The Unified Modeling Language , 2002, Lecture Notes in Computer Science.
[5] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[6] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[7] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[8] Markus Schumacher,et al. Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.
[9] Thomas A Henzinger,et al. Two challenges in embedded systems design: predictability and robustness , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[10] Bruce Powell Douglass,et al. Real-time UML (2nd ed.): developing efficient objects for embedded systems , 1997 .
[11] Hermann Kopetz,et al. The Complexity Challenge in Embedded System Design , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[12] Holger Giese,et al. Design of self-managing dependable systems with UML and fault tolerance patterns , 2004, WOSS '04.
[13] Antonio Maña,et al. Towards Precise Security Patterns , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.
[14] Alan W. Brown,et al. The Current State , 2016 .
[15] Garry D. Coleman,et al. Advancing the Standard , 1999 .
[16] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[17] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[18] Massimo Felici,et al. Using Security and Dependability Patterns for Reaction Processes , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.
[19] John Grundy,et al. Design pattern modelling and instantiation using DPML , 2002 .
[20] Jacques D. Fleuriot,et al. Diagrammatically-Driven Formal Verification of Web-Services Composition , 2012, Diagrams.
[21] Murray Silverstein,et al. A Pattern Language , 1977 .
[22] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[23] Mladen A. Vouk,et al. The Reliable Hybrid Pattern A Generalized Software Fault Tolerant Design Pattern , 1997 .
[24] Jean-Marc Jézéquel,et al. Precise Modeling of Design Patterns , 2000, UML.