Secure design patterns, 2009. ,
Security Engineering with Patterns, vol.3540407316, 2001. ,
Categorization of Security Design Patterns, Electronic Theses and Dissertations.Paper 1119, 2013. ,
, , 2002.
Organizing security patterns, IEEE Softw, vol.24, pp.52-60, 2007. ,
DOI : 10.1109/ms.2007.114
Static verification of security requirements in role based CSCW systems, Proc. eighth ACM Symp. Access Control Model.Technol.SACMAT "03, p.196, 2003. ,
Using Security Patterns to Model and Analyze Security Requirements, Work. Requir.Eng. High Assur.Syst, pp.13-22, 2003. ,
Attack model based penetration test for SQL injection vulnerability, Proc.-Int. Comput.Softw. Appl. Conf, pp.589-594, 2012. ,
Security Patterns, Informatik-Spektrum, vol.25, pp.220-223, 2002. ,
, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, 2005.
, Open Web Application Security project
, Common Weakness Enumeration
Bad smells in design and design patterns, Journal of Object Technology, ETH S.F.I.T, vol.8, issue.3, pp.43-63, 2009. ,
Interactive verification of UML state machines, Form. Methods Softw. Eng, pp.434-448, 2004. ,