The state of the art on design patterns: A systematic mapping of the literature

BB Mayvan, A Rasoolzadegan, ZG Yazdi - Journal of Systems and …, 2017 - Elsevier
Abstract Design patterns are widely used by software developers to build complex systems.
Hence, they have been investigated by many researchers in recent decades. This leads to …

[图书][B] Security patterns in practice: designing secure architectures using software patterns

E Fernandez-Buglioni - 2013 - books.google.com
Learn to combine security theory and code to produce secure systems Security is clearly a
crucial issue to consider during the design and implementation of any distributed software …

The state of the art on design patterns

B Bafandeh Mayvan, A Rasoolzadegan… - Journal of Systems and …, 2017 - dl.acm.org
A comprehensive SMS on the design patterns to identify the related topics and detect trends
and gaps. There are six main topics in the field of design patterns. Developing and Mining …

A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Abstract features in feature modeling

T Thum, C Kastner, S Erdweg… - 2011 15th International …, 2011 - ieeexplore.ieee.org
A software product line is a set of program variants, typically generated from a common code
base. Feature models describe variability in product lines by documenting features and their …

[PDF][PDF] A survey on security patterns

N Yoshioka, H Washizaki, K Maruyama - Progress in informatics, 2008 - academia.edu
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …

Agent based information security framework for hybrid cloud computing

MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

Growing a pattern language (for security)

M Hafiz, P Adamczyk, RE Johnson - … on New ideas, new paradigms, and …, 2012 - dl.acm.org
Researchers and practitioners have been successfully documenting software patterns for
over two decades. But the next step--building pattern languages--has proven much more …

A pattern language for developing privacy enhancing technologies

M Hafiz - Software: Practice and Experience, 2013 - Wiley Online Library
SUMMARY A privacy enhancing technology (PET) is an application or a mechanism that
allows users to protect the privacy of their personally identifiable information. Early PETs …