[PDF][PDF] A survey on security patterns

N Yoshioka, H Washizaki, K Maruyama - Progress in informatics, 2008 - academia.edu
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …

Attack patterns: A new forensic and design tool

E Fernandez, J Pelaez, M Larrondo-Petrie - Advances in Digital Forensics …, 2007 - Springer
A pattern is an encapsulated solution to a problem in a given context that can be used to
guide system design and evaluation. Analysis, design and architectural patterns are …

Automated verification of security pattern compositions

J Dong, T Peng, Y Zhao - Information and Software Technology, 2010 - Elsevier
Software security becomes a critically important issue for software development when more
and more malicious attacks explore the security holes in software systems. To avoid security …

Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks

D Álvarez, P Nuño, CT González, FG Bulnes… - Sensors, 2023 - mdpi.com
The defence-in-depth (DiD) methodology is a defensive approach usually performed by
network administrators to implement secure networks by layering and segmenting them …

[PDF][PDF] Organizing security patterns related to security and pattern recognition requirements

M Bunke, R Koschke, K Sohr - International Journal on Advances in …, 2012 - iariajournals.org
Software security is an emerging area in software development. More and more
vulnerabilities are published and highlight the endangerment of systems. Hence, software …

Evaluation of web application security risks and secure design patterns

AK Dalai, SK Jena - Proceedings of the 2011 International Conference …, 2011 - dl.acm.org
The application of security in web application is of profound importance due to the extended
use of web for business. Most of the attacks, are either because the developers are not …

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks

M Ibrahim, MT Abdullah… - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
Although the invention of Voice over Internet Protocol (VoIP) in communication technology
created significant attractive services for its users, it also brings new security threats …

Misuse patterns in VoIP

JC Pelaez, EB Fernandez… - Proceedings of the 14th …, 2007 - dl.acm.org
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be
aware of typical risks and to have a good understanding of how vulnerabilities can be …

Medical portals: web-based access to medical information

M Shepherd, D Zitner, C Watters - Proceedings of the 33rd …, 2000 - ieeexplore.ieee.org
Public portals, such as Web search engines, have been available for a number of years and
corporate portals that facilitate access to enterprise information within a company, normally …

Structured pattern-based security requirements elicitation for clouds

K Beckers, M Heisel, I Côté, L Goeke… - … Reliability and Security, 2013 - ieeexplore.ieee.org
Economic benefits make cloud computing systems a very attractive alternative to traditional
IT-systems. However, numerous concerns about the security of cloud computing services …