Architectural patterns for enabling application security, Proceedings of PLoP, vol.51, p.31, 1997. ,
, Security patterns repository
Does organizing security patterns focus architectural choices, Proceedings-International Conference on Software Engineering, pp.617-627, 2012. ,
A Natural Classification Scheme for Software Security Patterns, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp.113-120, 2011. ,
A Comparative Study of Software Security Pattern Classifications, 2012 Seventh International Conference on Availability, Reliability and Security, pp.582-589, 2012. ,
Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns, Ninth International Conference on Availability, Reliability and Security, pp.476-483, 2014. ,
A system of security patterns, 2006. ,
Classifying security patterns, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.4976, pp.342-347, 2008. ,
Towards a structured unified process for software security, Proceedings of the 2006 international workshop on Software engineering for secure systems, pp.3-10, 2006. ,
, Security pattern classification
Organizing security patterns related to security and pattern recognition requirements, International Journal on Advances in Security, vol.5, 2012. ,
Security patterns and secure systems design, pp.233-234, 2007. ,
Using an Ontology to Suggest Software Design Patterns Integration, pp.318-331, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-02042311
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, 2005. ,
, Common weakness enumeration
Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, 2001. ,
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
Web application security engineering, Security & Privacy, IEEE, vol.4, issue.4, pp.16-24, 2006. ,
Improving Web Application Security, 2003. ,
Considering Defense in Depth for Software Applications, IEEE Security and Privacy, vol.2, issue.1, pp.72-75, 2004. ,
Security patterns, 2003. ,
Attack-defense trees, Journal of Logic and Computation, p.29, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01825088