[图书][B] Security patterns in practice: designing secure architectures using software patterns

E Fernandez-Buglioni - 2013 - books.google.com
Learn to combine security theory and code to produce secure systems Security is clearly a
crucial issue to consider during the design and implementation of any distributed software …

Security patterns: A systematic mapping study

AJ Jafari, A Rasoolzadegan - Journal of Computer Languages, 2020 - Elsevier
Security patterns are a well-established means to encapsulate and communicate proven
security solutions and introduce security into the development process. Our objective is to …

A survey of security solutions for distributed publish/subscribe systems

AV Uzunov - Computers & Security, 2016 - Elsevier
Over the last two decades, the need for loosely-coupled, asynchronous communications and
distributed component interaction has made the publish/subscribe pattern increasingly …

Tracing cve vulnerability information to capec attack patterns using natural language processing techniques

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Information, 2021 - mdpi.com
For effective vulnerability management, vulnerability and attack information must be
collected quickly and efficiently. A security knowledge repository can collect such …

Microservice security metrics for secure communication, identity management, and observability

U Zdun, PJ Queval, G Simhandl… - ACM transactions on …, 2023 - dl.acm.org
Microservice architectures are increasingly being used to develop application systems.
Despite many guidelines and best practices being published, architecting microservice …

A catalog of security architecture weaknesses

JCS Santos, K Tarrit, M Mirakhorli - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Secure by design is an approach to developing secure software systems from the ground
up. In such approach, the alternate security tactics are first thought, among them, the best …

Security pattern for cloud SaaS: From system and data security to privacy case study in AWS and Azure

A Rath, B Spasic, N Boucart, P Thiran - Computers, 2019 - mdpi.com
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model.
This is because the Cloud has many advantages over the traditional private infrastructure …

Comparative evaluation of nlp-based approaches for linking capec attack patterns from cve vulnerability information

K Kanakogi, H Washizaki, Y Fukazawa, S Ogata… - Applied Sciences, 2022 - mdpi.com
Vulnerability and attack information must be collected to assess the severity of vulnerabilities
and prioritize countermeasures against cyberattacks quickly and accurately. Common …

Securing distributed systems using patterns: A survey

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …

An architectural approach to the integration of safety and security requirements in smart products and systems design

A Riel, C Kreiner, R Messnarz, A Much - CIRP annals, 2018 - Elsevier
Assuring functional safety and IT security is rapidly becoming an essential key challenge to
the design of any connected smart product and industrial manufacturing system. This paper …