A systematic review of security requirements engineering

D Mellado, C Blanco, LE Sánchez… - Computer Standards & …, 2010 - Elsevier
One of the most important aspects in the achievement of secure software systems in the
software development process is what is known as Security Requirements Engineering …

A quantitative analysis of current security concerns and solutions for cloud computing

N Gonzalez, C Miers, F Redigolo, M Simplicio… - Journal of Cloud …, 2012 - Springer
Abstract The development of cloud computing services is speeding up the rate in which the
organizations outsource their computational services or sell their idle computational …

A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Abstract features in feature modeling

T Thum, C Kastner, S Erdweg… - 2011 15th International …, 2011 - ieeexplore.ieee.org
A software product line is a set of program variants, typically generated from a common code
base. Feature models describe variability in product lines by documenting features and their …

[PDF][PDF] A survey on security patterns

N Yoshioka, H Washizaki, K Maruyama - Progress in informatics, 2008 - academia.edu
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …

A taxonomy and survey of self-protecting software systems

E Yuan, S Malek - … on Software Engineering for Adaptive and …, 2012 - ieeexplore.ieee.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

A methodology to develop secure systems using patterns

EB Fernandez, MM Larrondo-Petrie - Information Security and Ethics …, 2008 - igi-global.com
We are developing a methodology to build secure software for complex applications and its
related support. This methodology considers the whole software lifecycle, uses security …

Object analysis patterns for embedded systems

S Konrad, BHC Cheng… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
Some of the most challenging tasks in building a software system are capturing, refining,
and analyzing requirements. How well these tasks are performed significantly impacts the …

An analysis of the security patterns landscape

T Heyman, K Yskout, R Scandariato… - … Workshop on Software …, 2007 - ieeexplore.ieee.org
Architectural and design patterns represent effective techniques to package expert
knowledge in a reusable way. Over time, they have proven to be very successful in software …