[图书][B] Security Patterns: Integrating security and systems engineering

M Schumacher, E Fernandez-Buglioni, D Hybertson… - 2013 - books.google.com
Most security books are targeted at security engineers and specialists. Few show how build
security into software. None breakdown the different concerns facing security at different …

[PDF][PDF] A pattern language for security models

EB Fernandez, R Pan - In Proc. of PLoP, 2001 - Citeseer
Security is a serious problem in the Internet and it is necessary to build new systems
incorporating security as integral part of their design. The use of patterns is a good tool to …

A pattern system for access control

T Priebe, EB Fernández, JI Mehlau… - Research Directions in …, 2004 - Springer
In order to develop trustworthy information systems, security aspects should be considered
from the early project stages. This is particularly true for authorization and access control …

Securing distributed systems using patterns: A survey

AV Uzunov, EB Fernandez, K Falkner - Computers & Security, 2012 - Elsevier
Driven by expanding scientific computing and business enterprise needs, the last decade
has seen a shift toward software paradigms in which distribution plays a central role. The …

Modelling secure systems using an agent oriented approach and security patterns

H Mouratidis, M Weiss, P Giorgini - International Journal of …, 2006 - repository.uel.ac.uk
In this paper we describe an approach for modelling security issues in information systems.
It is based on an agent-oriented approach, and extends it with the use of security patterns …

Encoding function pointers and memory arrangement checking against buffer overflow attack

C Pyo, G Lee - … Security: 4th International Conference, ICICS 2002 …, 2002 - Springer
Program counter is the only mechanism for processor to access instruction to execute.
Protecting program counter is the fundamental defense for securing computer system. This …

A pattern language for identity management

N Delessy, EB Fernandez… - … Multi-Conference on …, 2007 - ieeexplore.ieee.org
The development of software has recently changed significantly. With the ubiquity of
computing, users may need to access a wider range of applications, which may not know …

[PDF][PDF] A model of methods access authorization in object-oriented databases

N Gal, E Gudesl, EB Fernandez - 1993 - researchgate.net
Object-oriented databases are a recent and important development and many studies of
them have been performed. These consider aspects such as data modeling, query …

[PDF][PDF] Security patterns and secure systems design

EB Fernandez - ACM Southeast Regional Conference, 2007 - researchgate.net
Abstract Analysis and design patterns are well established as a convenient and reusable
way to build high-quality object-oriented software. Patterns combine experience and good …

Access controls by object-oriented concepts

W Essmayr, G Pernul, AM Tjoa - Database Security XI: Status and …, 1998 - Springer
This paper introduces object-oriented access controls (OOAC) as a result of consequently
applying the object-oriented paradigm for providing access controls in object and …