Engineering secure systems: Models, patterns and empirical validation
B Hamid, D Weber - Computers & Security, 2018 - Elsevier
Several development approaches have been proposed to handle the growing complexity of
software system design. The most popular methods use models as the main artifacts to …
software system design. The most popular methods use models as the main artifacts to …
Supporting pattern-based dependability engineering via model-driven development: Approach, tool-support and empirical validation
Safety-critical systems require a high level of safety and integrity. Therefore, generating such
systems involves specific software building processes. Many domains are not traditionally …
systems involves specific software building processes. Many domains are not traditionally …
Guiding the selection of security patterns based on security requirements and pattern classification
Security pattern-based system and software engineering (PBSE) approaches aim at building
secure software and systems by capturing and reusing artifacts that encapsulate security …
secure software and systems by capturing and reusing artifacts that encapsulate security …
Guiding the selection of security patterns for real-time systems
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature
especially when it comes to critical transmitted data in a real-time environment. At the same …
especially when it comes to critical transmitted data in a real-time environment. At the same …
Patterns for the design of secure and dependable software defined networks
In an interconnected world, cyber and physical networks face a number of challenges that
need to be resolved. These challenges are mainly due to the nature and complexity of …
need to be resolved. These challenges are mainly due to the nature and complexity of …
Model-based real-time evaluation of security patterns: A SCADA system case study
Securing critical systems such as cyber physical systems (CPS) is an important feature
especially when it comes to critical transmitted data. At the same time, the implementation of …
especially when it comes to critical transmitted data. At the same time, the implementation of …
Implementation support of security design patterns using test templates
M Yoshizawa, H Washizaki, Y Fukazawa, T Okubo… - Information, 2016 - mdpi.com
Security patterns are intended to support software developers as the patterns encapsulate
security expert knowledge. However, these patterns may be inappropriately applied …
security expert knowledge. However, these patterns may be inappropriately applied …
An MDE-based approach for self-adaptive RTES model generation
Raising the design abstraction level has been, since many years, a prominent solution to
decrease the complexity of self-adaptive real time embedded systems (RTES) and increase …
decrease the complexity of self-adaptive real time embedded systems (RTES) and increase …
Designing secure software by testing application of security patterns
T Kobashi, H Washizaki, N Yoshioka… - Exploring Security in …, 2019 - igi-global.com
Simply confirming potential threats and vulnerabilities in an early stage of the development
process (eg, the requirement or design phase) is insufficient because software developers …
process (eg, the requirement or design phase) is insufficient because software developers …
MBSPI—A Model-Based Security Pattern Integration Approach for software architectures
A Motii, M El Hamlaoui - 2024 19th Conference on Computer …, 2024 - ieeexplore.ieee.org
Incorporating security patterns into software architecture is essential for robust system
design. Model Driven Engineering (MDE) offers a structured approach to software …
design. Model Driven Engineering (MDE) offers a structured approach to software …