Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)

R Kumar, R Goyal - Computers & Security, 2020 - Elsevier
Agile software development methodology and DevOps, together, have helped the business
to achieve agility and velocity in delivering time-to-market applications and services. Open …

[PDF][PDF] A survey on security patterns

N Yoshioka, H Washizaki, K Maruyama - Progress in informatics, 2008 - academia.edu
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …

A methodology to develop secure systems using patterns

EB Fernandez, MM Larrondo-Petrie - Information Security and Ethics …, 2008 - igi-global.com
We are developing a methodology to build secure software for complex applications and its
related support. This methodology considers the whole software lifecycle, uses security …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

Eliciting security requirements through misuse activities

FA Braz, EB Fernandez… - 2008 19th International …, 2008 - ieeexplore.ieee.org
In previous work we introduced an approach for finding security requirements based on
misuse activities (actions). This method starts from the activity diagram of a use case (or a …

Attack patterns: A new forensic and design tool

E Fernandez, J Pelaez, M Larrondo-Petrie - Advances in Digital Forensics …, 2007 - Springer
A pattern is an encapsulated solution to a problem in a given context that can be used to
guide system design and evaluation. Analysis, design and architectural patterns are …

Modeling misuse patterns

EB Fernandez, N Yoshioka… - … , Reliability and Security, 2009 - ieeexplore.ieee.org
Security patterns are now starting to be accepted by industry. Security patterns are useful to
guide the security design of systems by providing generic solutions that can stop a variety of …

Security patterns for voice over ip networks

EB Fernandez, JC Pelaez… - … Multi-Conference on …, 2007 - ieeexplore.ieee.org
Voice over IP (VoIP) has had a strong effect on global communications by allowing human
voice and fax information to travel over existing packet data networks along with traditional …

A multi-dimensional classification for users of security patterns

M VanHilst, EB Fernandez, F Braz - Journal of Research and …, 2009 - search.informit.org
This paper presents a classification for security patterns that addresses the needs of users.
The approach uses a matrix defined by dividing the problem space along multiple …

A methodological approach to apply security tactics in software architecture design

G Pedraza-Garcia, H Astudillo… - 2014 IEEE Colombian …, 2014 - ieeexplore.ieee.org
Architectural tactics are decisions to efficiently solve quality attributes in software
architecture. Security is a complex quality property due to its strong dependence on the …