Introduction: The SERENITY vision
暂无分享,去创建一个
[1] Marius Iulian Mihailescu,et al. Security Design Patterns , 2010 .
[2] Neelam Soundarajan,et al. Monitoring Design Pattern Contracts , 2004 .
[3] James A. Whittaker,et al. How to Break Software Security , 2003 .
[4] Douglas C. Schmidt,et al. Patterns, frameworks, and middleware: their synergistic relationships , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[5] Tommi Mikkonen,et al. Formalizing design patterns , 1998, Proceedings of the 20th International Conference on Software Engineering.
[6] Eduardo B. Fernández,et al. Two Patterns for Web Services Security , 2004, International Conference on Internet Computing.
[7] Eduardo B. Fernandez,et al. Metadata and authorization patterns , 2000 .
[8] A Min Tjoa,et al. Access Controls by Object-Oriented Concepts , 1997, DBSec.
[9] Eduardo B. Fernández,et al. A Pattern System for Access Control , 2004, DBSec.
[10] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[11] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .
[12] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[13] Neelam Soundarajan,et al. Pattern-Based System Evolution: A Case-Study , 2006, SEKE.
[14] Tim Kelly,et al. Deriving safety requirements using scenarios , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[15] Haralambos Mouratidis,et al. Security Patterns for Agent Systems , 2003 .