Systematic literature review of security pattern research

H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

ASE: A comprehensive pattern-driven security methodology for distributed systems

AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …

Achieving sender anonymity in tor against the global passive adversary

F Buccafurri, V De Angelis, MF Idone, C Labrini… - Applied Sciences, 2021 - mdpi.com
Tor is the de facto standard used for anonymous communication over the Internet. Despite
its wide usage, Tor does not guarantee sender anonymity, even in a threat model in which …

Vitool-BC: Visualization tool based on Cooja simulator for WSN

D Jabba, P Acevedo - Applied Sciences, 2021 - mdpi.com
Evaluation and monitoring of wireless sensor networks (WSN) and the parameters defining
their operations and design, such as energy consumption, latency, and stability, is a …

Critical dimensions of blockchain technology implementation in the healthcare industry: An integrated systems management approach

S Aich, S Tripathy, MI Joo, HC Kim - Sustainability, 2021 - mdpi.com
In the digital era, almost every system is connected to a digital platform to enhance
efficiency. Although life is thus improved, security issues remain important, especially in the …

Privacy preserving data aggregation for smart grid with user anonymity and designated recipients

L Wu, W Zhang, W Zhao - Symmetry, 2022 - mdpi.com
Smart grids integrate modern Internet of Things technologies with the traditional grid
systems, aiming to achieve effective and reliable electricity distribution as well as promote …

Expediting the design and development of secure cloud-based mobile apps

FT Chimuco, JBF Sequeiros, TMC Simōes… - International Journal of …, 2024 - Springer
The adoption and popularity of mobile devices by end-users is partially driven by the
increasing development and availability of mobile applications that can aid solving different …

Reversible Image Fragile Watermarking with Dual Tampering Detection

C Zhan, L Leng, CC Chang, JH Horng - Electronics, 2024 - mdpi.com
The verification of image integrity has attracted increasing attention. Irreversible algorithms
embed fragile watermarks into cover images to verify their integrity, but they are not …

Dynamic security properties monitoring architecture for cloud computing

A Muñoz, A Maña, J González - Security Engineering for Cloud …, 2013 - igi-global.com
In this chapter, the authors provide an overview of the importance of the monitoring of
security properties in cloud computing scenarios. They then present an approach based on …