共 50 条
- [1] An Approach for Security Patterns Application in Component Based Models [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT V, 2014, 8583 : 283 - +
- [2] A security engineering process based on patterns [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 734 - +
- [3] A Security Engineering Process for Systems of Systems using Security Patterns [J]. 2014 8TH ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2014, : 8 - 11
- [4] Ontology Based Patterns for Software Security Engineering [J]. ADVANCES IN KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, 2012, 243 : 406 - 419
- [5] Secure Component Based Applications Through Security Patterns [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 749 - 754
- [6] The new topicality of using Formal Models of Security Policy within the security engineering process [J]. APPLIED FORMAL METHODS - FM-TRENDS 98, 1999, 1641 : 302 - 310
- [7] A process engineering method based on ontology and patterns [J]. ICSOFT 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL ISDM/ABF, 2008, : 29 - 36
- [8] System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework [J]. SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (01): : 349 - 359
- [9] Process Patterns for Component-Based Software Development [J]. COMPONENT-BASED SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5582 : 54 - 68
- [10] Applying Security Patterns for Component Based Applications Using UML Profile [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 186 - 193