Securing distributed systems using patterns: A survey

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …

Software-security patterns: degree of maturity

M Bunke - Proceedings of the 20th European Conference on …, 2015 - dl.acm.org
Since Gamma et al. published their design patterns, patterns are very popular in the area of
software engineering. They provide best practice to handle recurring problems during the …

Holistic strategy-based threat model for organizations

M Meinig, MIH Sukmana, KA Torkura… - Procedia Computer …, 2019 - Elsevier
Data breaches, privacy violations and cyber-attacks are growing problems for companies
and governmental organizations. Threat modelling serves as a heuristic procedure of …

A natural classification scheme for software security patterns

AK Alvi, M Zulkernine - 2011 IEEE Ninth International …, 2011 - ieeexplore.ieee.org
Software security patterns are a proven solution for recurring security problems. Security
pattern catalogs are increasing rapidly. This creates difficulty in selecting appropriate …

A comparative study of software security pattern classifications

AK Alvi, M Zulkernine - 2012 Seventh International Conference …, 2012 - ieeexplore.ieee.org
Software security patterns can be the building blocks of secure software systems. They
provide reliable solutions for recurring security problems. The rapid increase in the number …

Survey on body of knowledge regarding software security

A Hazeyama - 2012 13th ACIS International Conference on …, 2012 - ieeexplore.ieee.org
With an increase in the services on the Internet, importance for software security
technologies has been recognized. A number of research and development programs …

A methodology of security pattern classification and of attack-defense tree generation

L Regainia, S Salva - … on Information Systems Security and Privacy …, 2017 - uca.hal.science
Security at the design stage of the software life cycle can be performed by means of security
patterns, which are viable and reusable solutions to regular security problems. Their generic …

A catalogue associating security patterns and attack steps to design secure applications

S Salva, L Regainia - Journal of Computer Security, 2019 - content.iospress.com
Design Patterns are now widely accepted and used in software engineering; they represent
generic and reusable solutions to common problems in software design. Security patterns …

Using data integration to help design more secure applications

S Salva, L Regainia - Risks and Security of Internet and Systems: 12th …, 2018 - Springer
Security patterns are reusable solutions, which enable the design of maintainable systems
or applications that have to meet security requirements. The generic nature of security …

Design for test of Mbit DRAMs

R Kraus, O Kowarik, K Hoffmann… - … .'Meeting the Tests of …, 1989 - ieeexplore.ieee.org
The authors describe a novel design for test of DRAMs (dynamic random-access memories)
which speeds up testing during wafer sort and final test, even after repair by redundant bit …