The state of the art on design patterns: A systematic mapping of the literature
Abstract Design patterns are widely used by software developers to build complex systems.
Hence, they have been investigated by many researchers in recent decades. This leads to …
Hence, they have been investigated by many researchers in recent decades. This leads to …
[图书][B] Security patterns in practice: designing secure architectures using software patterns
E Fernandez-Buglioni - 2013 - books.google.com
Learn to combine security theory and code to produce secure systems Security is clearly a
crucial issue to consider during the design and implementation of any distributed software …
crucial issue to consider during the design and implementation of any distributed software …
The state of the art on design patterns
B Bafandeh Mayvan, A Rasoolzadegan… - Journal of Systems and …, 2017 - dl.acm.org
A comprehensive SMS on the design patterns to identify the related topics and detect trends
and gaps. There are six main topics in the field of design patterns. Developing and Mining …
and gaps. There are six main topics in the field of design patterns. Developing and Mining …
A systematic survey of self-protecting software systems
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
Abstract features in feature modeling
A software product line is a set of program variants, typically generated from a common code
base. Feature models describe variability in product lines by documenting features and their …
base. Feature models describe variability in product lines by documenting features and their …
[PDF][PDF] A survey on security patterns
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …
reusable solutions to security problems. Although many security patterns and techniques for …
Agent based information security framework for hybrid cloud computing
MI Tariq - KSII Transactions on Internet and Information Systems …, 2019 - koreascience.kr
In general, an information security approach estimates the risk, where the risk is to occur due
to an unusual event, and the associated consequences for cloud organization. Information …
to an unusual event, and the associated consequences for cloud organization. Information …
Architecture-based self-protecting software systems
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
Growing a pattern language (for security)
M Hafiz, P Adamczyk, RE Johnson - … on New ideas, new paradigms, and …, 2012 - dl.acm.org
Researchers and practitioners have been successfully documenting software patterns for
over two decades. But the next step--building pattern languages--has proven much more …
over two decades. But the next step--building pattern languages--has proven much more …
A pattern language for developing privacy enhancing technologies
M Hafiz - Software: Practice and Experience, 2013 - Wiley Online Library
SUMMARY A privacy enhancing technology (PET) is an application or a mechanism that
allows users to protect the privacy of their personally identifiable information. Early PETs …
allows users to protect the privacy of their personally identifiable information. Early PETs …