Engineering secure systems: Models, patterns and empirical validation

B Hamid, D Weber - Computers & Security, 2018 - Elsevier
Several development approaches have been proposed to handle the growing complexity of
software system design. The most popular methods use models as the main artifacts to …

Supporting pattern-based dependability engineering via model-driven development: Approach, tool-support and empirical validation

B Hamid, J Perez - Journal of Systems and Software, 2016 - Elsevier
Safety-critical systems require a high level of safety and integrity. Therefore, generating such
systems involves specific software building processes. Many domains are not traditionally …

Guiding the selection of security patterns based on security requirements and pattern classification

A Motii, B Hamid, A Lanusse, JM Bruel - Proceedings of the 20th …, 2015 - dl.acm.org
Security pattern-based system and software engineering (PBSE) approaches aim at building
secure software and systems by capturing and reusing artifacts that encapsulate security …

Guiding the selection of security patterns for real-time systems

A Motii, B Hamid, A Lanusse… - 2016 21st International …, 2016 - ieeexplore.ieee.org
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature
especially when it comes to critical transmitted data in a real-time environment. At the same …

Patterns for the design of secure and dependable software defined networks

NE Petroulakis, G Spanoudakis, IG Askoxylakis - Computer Networks, 2016 - Elsevier
In an interconnected world, cyber and physical networks face a number of challenges that
need to be resolved. These challenges are mainly due to the nature and complexity of …

Model-based real-time evaluation of security patterns: A SCADA system case study

A Motii, A Lanusse, B Hamid, JM Bruel - Computer Safety, Reliability, and …, 2016 - Springer
Securing critical systems such as cyber physical systems (CPS) is an important feature
especially when it comes to critical transmitted data. At the same time, the implementation of …

Implementation support of security design patterns using test templates

M Yoshizawa, H Washizaki, Y Fukazawa, T Okubo… - Information, 2016 - mdpi.com
Security patterns are intended to support software developers as the patterns encapsulate
security expert knowledge. However, these patterns may be inappropriately applied …

An MDE-based approach for self-adaptive RTES model generation

M Ben Said, Y Hadj Kacem, M Kerboeuf, M Abid - Cluster Computing, 2020 - Springer
Raising the design abstraction level has been, since many years, a prominent solution to
decrease the complexity of self-adaptive real time embedded systems (RTES) and increase …

Designing secure software by testing application of security patterns

T Kobashi, H Washizaki, N Yoshioka… - Exploring Security in …, 2019 - igi-global.com
Simply confirming potential threats and vulnerabilities in an early stage of the development
process (eg, the requirement or design phase) is insufficient because software developers …

MBSPI—A Model-Based Security Pattern Integration Approach for software architectures

A Motii, M El Hamlaoui - 2024 19th Conference on Computer …, 2024 - ieeexplore.ieee.org
Incorporating security patterns into software architecture is essential for robust system
design. Model Driven Engineering (MDE) offers a structured approach to software …