A survey on security patterns
Top Cited Papers
- 1 March 2008
- journal article
- Published by National Institute of Informatics (NII) in Progress in Informatics
- No. 5,p. 35
- https://doi.org/10.2201/niipi.2008.5.5
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- Organizing Security PatternsIEEE Software, 2007
- An Analysis of the Security Patterns LandscapePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A Methodology to Develop Secure Systems Using PatternsPublished by IGI Global ,2007
- MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNSInternational Journal of Software Engineering and Knowledge Engineering, 2006
- Secure Software Development by ExampleIEEE Security & Privacy, 2005
- Defect frequency and design patterns: an empirical study of industrial codeIEEE Transactions on Software Engineering, 2004
- An aspect-based approach to modeling access control concernsInformation and Software Technology, 2004
- Refactoring to PatternsPublished by Springer Nature ,2004
- A Qualitative Evaluation of Security PatternsPublished by Springer Nature ,2004
- Logical foundations of object-oriented and frame-based languagesJournal of the ACM, 1995