Growing a pattern language (for security)

M Hafiz, P Adamczyk, RE Johnson - … on New ideas, new paradigms, and …, 2012 - dl.acm.org
Researchers and practitioners have been successfully documenting software patterns for
over two decades. But the next step--building pattern languages--has proven much more …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

Software-security patterns: degree of maturity

M Bunke - Proceedings of the 20th European Conference on …, 2015 - dl.acm.org
Since Gamma et al. published their design patterns, patterns are very popular in the area of
software engineering. They provide best practice to handle recurring problems during the …

[PDF][PDF] Organizing security patterns related to security and pattern recognition requirements

M Bunke, R Koschke, K Sohr - International Journal on Advances in …, 2012 - iariajournals.org
Software security is an emerging area in software development. More and more
vulnerabilities are published and highlight the endangerment of systems. Hence, software …

A qualitative analysis of software security patterns

ST Halkidis, A Chatzigeorgiou, G Stephanides - computers & security, 2006 - Elsevier
Software security, which has attracted the interest of the industrial and research community
during the last years, aims at preventing security problems by building software without the …

Isolation and beyond: Challenges for system security

T Hunt, Z Jia, V Miller, CJ Rossbach… - Proceedings of the …, 2019 - dl.acm.org
System security has historically relied on hardware-provided isolation primitives. However,
Meltdown [36] and Spectre [30] demonstrate that basic user/kernel isolation could be …

A methodology for mining security tactics from security patterns

J Ryoo, P Laplante, R Kazman - 2010 43rd Hawaii International …, 2010 - ieeexplore.ieee.org
Although many aids such as architectural styles and patterns are now available for software
architects, making optimal design decisions on appropriate architectural structures still …

[图书][B] Threats: What Every Engineer Should Learn From Star Wars

A Shostack - 2023 - books.google.com
Secure your applications with help from your favorite Jedi masters In Threats: What Every
Engineer Should Learn From Star Wars, accomplished security expert and educator Adam …

[PDF][PDF] Security patterns and their classification schemes

M Hafiz, RE Johnson - University of Illinois at Urbana-Champaign …, 2006 - Citeseer
Finding the appropriate pattern to solve a particular security problem is difficult because of
the absence of a scientific classification scheme for security patterns. A suitable …

Decomposing utility functions in bounded max-sum for distributed constraint optimization

E Rollon, J Larrosa - International conference on principles and practice of …, 2014 - Springer
Abstract Bounded Max-Sum is a message-passing algorithm for solving Distributed
Constraint Optimization Problems (DCOP) able to compute solutions with a guaranteed …