[图书][B] Security patterns in practice: designing secure architectures using software patterns
E Fernandez-Buglioni - 2013 - books.google.com
Learn to combine security theory and code to produce secure systems Security is clearly a
crucial issue to consider during the design and implementation of any distributed software …
crucial issue to consider during the design and implementation of any distributed software …
Security patterns: A systematic mapping study
AJ Jafari, A Rasoolzadegan - Journal of Computer Languages, 2020 - Elsevier
Security patterns are a well-established means to encapsulate and communicate proven
security solutions and introduce security into the development process. Our objective is to …
security solutions and introduce security into the development process. Our objective is to …
A survey of security solutions for distributed publish/subscribe systems
AV Uzunov - Computers & Security, 2016 - Elsevier
Over the last two decades, the need for loosely-coupled, asynchronous communications and
distributed component interaction has made the publish/subscribe pattern increasingly …
distributed component interaction has made the publish/subscribe pattern increasingly …
Tracing cve vulnerability information to capec attack patterns using natural language processing techniques
For effective vulnerability management, vulnerability and attack information must be
collected quickly and efficiently. A security knowledge repository can collect such …
collected quickly and efficiently. A security knowledge repository can collect such …
Microservice security metrics for secure communication, identity management, and observability
U Zdun, PJ Queval, G Simhandl… - ACM transactions on …, 2023 - dl.acm.org
Microservice architectures are increasingly being used to develop application systems.
Despite many guidelines and best practices being published, architecting microservice …
Despite many guidelines and best practices being published, architecting microservice …
A catalog of security architecture weaknesses
Secure by design is an approach to developing secure software systems from the ground
up. In such approach, the alternate security tactics are first thought, among them, the best …
up. In such approach, the alternate security tactics are first thought, among them, the best …
Security pattern for cloud SaaS: From system and data security to privacy case study in AWS and Azure
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model.
This is because the Cloud has many advantages over the traditional private infrastructure …
This is because the Cloud has many advantages over the traditional private infrastructure …
Comparative evaluation of nlp-based approaches for linking capec attack patterns from cve vulnerability information
Vulnerability and attack information must be collected to assess the severity of vulnerabilities
and prioritize countermeasures against cyberattacks quickly and accurately. Common …
and prioritize countermeasures against cyberattacks quickly and accurately. Common …
Securing distributed systems using patterns: A survey
AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …
has seen a shift toward software paradigms in which distribution plays a central role. The …
An architectural approach to the integration of safety and security requirements in smart products and systems design
Assuring functional safety and IT security is rapidly becoming an essential key challenge to
the design of any connected smart product and industrial manufacturing system. This paper …
the design of any connected smart product and industrial manufacturing system. This paper …