Yskout et al., 2008 - Google Patents
Security patterns: 10 years laterYskout et al., 2008
View PDF- Document ID
- 11273787414478135461
- Author
- Yskout K
- Heyman T
- Scandariato R
- Joosen W
- Publication year
- Publication venue
- CW Reports
External Links
Snippet
Reusing time-tested solutions rather than inventing ad-hoc quick fixes is a well-known security principle. Architectural and design patterns represent proven techniques to package knowledge from software engineering experts in a reusable format. More importantly, the …
- 238000000034 method 0 abstract description 31
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ansari et al. | STORE: Security threat oriented requirements engineering methodology | |
| US20190394243A1 (en) | System and method of a requirement, active compliance and resource management for cyber security application | |
| US20190394242A1 (en) | System and method of a requirement, active compliance and resource management for cyber security application | |
| Heyman et al. | An analysis of the security patterns landscape | |
| US8539437B2 (en) | Security process model for tasks within a software factory | |
| Haley et al. | Using trust assumptions with security requirements | |
| Ekstedt et al. | Yet another cybersecurity risk assessment framework | |
| Müller et al. | Towards trust-aware collaborative business processes: an approach to identify uncertainty | |
| Ahmed et al. | A taxonomy for assessing security in business process modelling | |
| Röhrig | Using process models to analyse it security requirements | |
| Di Pietro et al. | Role mining in business: taming role-based access control administration | |
| Rychkova et al. | Trustworthiness requirements in information systems design: lessons learned from the blockchain community | |
| Yskout et al. | Security patterns: 10 years later | |
| Aversano et al. | An assessment strategy for identifying legacy system evolution requirements in eBusiness context | |
| Salini et al. | A model based security requirements engineering framework applied for online trading system | |
| Xu et al. | Threat-driven design and analysis of secure software architectures | |
| Baldwin et al. | A model-based approach to trust, security and assurance | |
| Kavakli et al. | Capability oriented RE for Cybersecurity and Personal Data Protection: Meeting the challenges of SMEs | |
| Phan et al. | Quality-driven business policy specification and refinement for service-oriented systems | |
| Krey | A framework for the adoption of bring your own device (BYOD) in the hospital environment | |
| Nassar et al. | Risk management and security in service-based architectures | |
| Avédissian et al. | An extension proposition for the agent-based language modeling ontology for the representation of supply chain integrated business processes | |
| Kearney et al. | A risk-driven security analysis method and modelling language | |
| da Rocha et al. | Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce. | |
| Harvey | Best Practices of Using Cloud-based Virtual Technologies to Improve Management in West Coast Governments |