共 50 条
- [1] Applying Security Patterns for Component Based Applications Using UML Profile [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 186 - 193
- [2] Building High Assurance Secure Applications using Security Patterns for Capability-Based Platforms [J]. PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 1401 - 1404
- [3] Development of Applications Based on Security Patterns [J]. DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 111 - +
- [5] A collaborative process for developing secure component based applications [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 306 - 311
- [6] An Approach for Security Patterns Application in Component Based Models [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT V, 2014, 8583 : 283 - +
- [7] Component-based development of secure mobile agents applications [J]. MULTI-AGENT SYSTEMS AND APPLICATIONS V, PROCEEDINGS, 2007, 4696 : 113 - 122
- [8] Security patterns and secure systems design [J]. Dependable Computing, Proceedings, 2007, 4746 : 233 - 234
- [9] An engineering process for security patterns application in component based models [J]. 2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 231 - 236