Security oriented program transformations (or how to add security on demand)
Companion to the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications
Security-oriented program transformations
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Improving perimeter security with security-oriented program transformations
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Introducing mitigation use cases to enhance the scope of test cases
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
An architecture-centric approach to detecting security patterns in software
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
The use of application scanners in software product quality assessment
Proceedings of the 8th international workshop on Software quality
Does organizing security patterns focus architectural choices?
Proceedings of the 34th International Conference on Software Engineering
Growing a pattern language (for security)
Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software
The nature of order: from security patterns to a pattern language
Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity
Architecture-based self-protecting software systems
Proceedings of the 9th international ACM Sigsoft conference on Quality of software architectures
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Every empire, after a period of rapid expansion, needs some time for consolidation or it risks disintegration. The expansion of software patterns has produced a large body of work that now needs organization. This article documents early efforts to consolidate and organize a subset of software patterns in the security domain. Lessons learned through this process can help people trying to organize patterns for other domains. This article is part of the special issue on software patterns.