[go: up one dir, main page]

Yskout et al., 2008 - Google Patents

Security patterns: 10 years later

Yskout et al., 2008

View PDF
Document ID
11273787414478135461
Author
Yskout K
Heyman T
Scandariato R
Joosen W
Publication year
Publication venue
CW Reports

External Links

Snippet

Reusing time-tested solutions rather than inventing ad-hoc quick fixes is a well-known security principle. Architectural and design patterns represent proven techniques to package knowledge from software engineering experts in a reusable format. More importantly, the …
Continue reading at lirias.kuleuven.be (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Ansari et al. STORE: Security threat oriented requirements engineering methodology
US20190394243A1 (en) System and method of a requirement, active compliance and resource management for cyber security application
US20190394242A1 (en) System and method of a requirement, active compliance and resource management for cyber security application
Heyman et al. An analysis of the security patterns landscape
US8539437B2 (en) Security process model for tasks within a software factory
Haley et al. Using trust assumptions with security requirements
Ekstedt et al. Yet another cybersecurity risk assessment framework
Müller et al. Towards trust-aware collaborative business processes: an approach to identify uncertainty
Ahmed et al. A taxonomy for assessing security in business process modelling
Röhrig Using process models to analyse it security requirements
Di Pietro et al. Role mining in business: taming role-based access control administration
Rychkova et al. Trustworthiness requirements in information systems design: lessons learned from the blockchain community
Yskout et al. Security patterns: 10 years later
Aversano et al. An assessment strategy for identifying legacy system evolution requirements in eBusiness context
Salini et al. A model based security requirements engineering framework applied for online trading system
Xu et al. Threat-driven design and analysis of secure software architectures
Baldwin et al. A model-based approach to trust, security and assurance
Kavakli et al. Capability oriented RE for Cybersecurity and Personal Data Protection: Meeting the challenges of SMEs
Phan et al. Quality-driven business policy specification and refinement for service-oriented systems
Krey A framework for the adoption of bring your own device (BYOD) in the hospital environment
Nassar et al. Risk management and security in service-based architectures
Avédissian et al. An extension proposition for the agent-based language modeling ontology for the representation of supply chain integrated business processes
Kearney et al. A risk-driven security analysis method and modelling language
da Rocha et al. Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce.
Harvey Best Practices of Using Cloud-based Virtual Technologies to Improve Management in West Coast Governments