Architectural tactics in software architecture: A systematic mapping study

G Márquez, H Astudillo, R Kazman - Journal of Systems and Software, 2023 - Elsevier
Architectural tactics are a key abstraction of software architecture, and support the
systematic design and analysis of software architectures to satisfy quality attributes. Since …

Systematic literature review of security pattern research

H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

A methodological approach to apply security tactics in software architecture design

G Pedraza-Garcia, H Astudillo… - 2014 IEEE Colombian …, 2014 - ieeexplore.ieee.org
Architectural tactics are decisions to efficiently solve quality attributes in software
architecture. Security is a complex quality property due to its strong dependence on the …

Software development initiatives to identify and mitigate security threats-two systematic mapping studies

P Silva, R Noël, S Matalonga, H Astudillo, D Gatica… - CLEI Electronic …, 2016 - clei.org
Software Security and development experts have addressed the problem of building secure
software systems. There are several processes and initiatives to achieve secure software …

Security tactics selection poker (TaSPeR) a card game to select security tactics to satisfy security requirements

F Osses, G Márquez, MM Villegas, C Orellana… - Proceedings of the 12th …, 2018 - dl.acm.org
Building secure software architectures requires taking several design decisions to achieve
security requirements; these decisions must be revised carefully before agreement given …

Mitigating security threats using tactics and patterns: a controlled experiment

G Pedraza-García, R Noël, S Matalonga… - Proccedings of the 10th …, 2016 - dl.acm.org
Security Patterns and Architectural Tactics are two well-known techniques for designing
secure software systems. There is little or no empirical evidence on their relative …

[PDF][PDF] Este documento ha sido preparado para el Ministerio de Ciencia, Tecnología, Conocimiento e Innovación (CTCI) en el marco de los compromisos adquiridos …

C del Informe, FH Leiva, BR Sánchez… - 2024 - derechocienciaytecnologia.uc.cl
El “Modelo de Madurez de Capacidades de Ciberseguridad para Naciones”(CMM, por sus
siglas en inglés:“Cybersecurity Capability Maturity Model for Nations”) es un marco …

[PDF][PDF] Comparando Patrones de Seguridad y Tácticas de Seguridad para construir sistemas seguros: Identificando amenazas de seguridad.

R Noël, G Pedraza-García, H Astudillo, S Matalonga… - CIbSE, 2015 - eventos.spc.org.pe
Los Patrones de seguridad y la Tácticas de la arquitectura para seguridad son dos
enfoques de reuso de conocimiento en la toma de decisiones para la construcción de …

Generating software security knowledge through empirical methods

R Noël, S Matalonga, G Pedraza… - … for Software Security, 2017 - taylorfrancis.com
This chapter exemplifies the use of experimental techniques, borrowed from software
engineering, to create validated knowledge in the Security field. Systematic approaches for …