Growing a pattern language (for security)
M Hafiz, P Adamczyk, RE Johnson - … on New ideas, new paradigms, and …, 2012 - dl.acm.org
Researchers and practitioners have been successfully documenting software patterns for
over two decades. But the next step--building pattern languages--has proven much more …
over two decades. But the next step--building pattern languages--has proven much more …
Engineering security into distributed systems: A survey of methodologies
A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …
software distribution as a central computing paradigm. This has been accompanied by a …
Software-security patterns: degree of maturity
M Bunke - Proceedings of the 20th European Conference on …, 2015 - dl.acm.org
Since Gamma et al. published their design patterns, patterns are very popular in the area of
software engineering. They provide best practice to handle recurring problems during the …
software engineering. They provide best practice to handle recurring problems during the …
[PDF][PDF] Organizing security patterns related to security and pattern recognition requirements
Software security is an emerging area in software development. More and more
vulnerabilities are published and highlight the endangerment of systems. Hence, software …
vulnerabilities are published and highlight the endangerment of systems. Hence, software …
A qualitative analysis of software security patterns
Software security, which has attracted the interest of the industrial and research community
during the last years, aims at preventing security problems by building software without the …
during the last years, aims at preventing security problems by building software without the …
Isolation and beyond: Challenges for system security
System security has historically relied on hardware-provided isolation primitives. However,
Meltdown [36] and Spectre [30] demonstrate that basic user/kernel isolation could be …
Meltdown [36] and Spectre [30] demonstrate that basic user/kernel isolation could be …
A methodology for mining security tactics from security patterns
Although many aids such as architectural styles and patterns are now available for software
architects, making optimal design decisions on appropriate architectural structures still …
architects, making optimal design decisions on appropriate architectural structures still …
[图书][B] Threats: What Every Engineer Should Learn From Star Wars
A Shostack - 2023 - books.google.com
Secure your applications with help from your favorite Jedi masters In Threats: What Every
Engineer Should Learn From Star Wars, accomplished security expert and educator Adam …
Engineer Should Learn From Star Wars, accomplished security expert and educator Adam …
[PDF][PDF] Security patterns and their classification schemes
M Hafiz, RE Johnson - University of Illinois at Urbana-Champaign …, 2006 - Citeseer
Finding the appropriate pattern to solve a particular security problem is difficult because of
the absence of a scientific classification scheme for security patterns. A suitable …
the absence of a scientific classification scheme for security patterns. A suitable …
Decomposing utility functions in bounded max-sum for distributed constraint optimization
E Rollon, J Larrosa - International conference on principles and practice of …, 2014 - Springer
Abstract Bounded Max-Sum is a message-passing algorithm for solving Distributed
Constraint Optimization Problems (DCOP) able to compute solutions with a guaranteed …
Constraint Optimization Problems (DCOP) able to compute solutions with a guaranteed …