Proceedings of the 11th international conference on Artificial intelligence and law
Constraint based role based access control in the SECTET-framework: A model-driven approach
Journal of Computer Security - Privacy, Security and Trust (PST) Technologies: Evolution and Challenges
From security patterns to implementation using petri nets
Proceedings of the fourth international workshop on Software engineering for secure systems
Security Patterns for Automated Continuous Auditing
Information Security Journal: A Global Perspective
A High-level Aspect-oriented-based Framework for Software Security Hardening
Information Security Journal: A Global Perspective
Enforcing a security pattern in stakeholder goal models
Proceedings of the 4th ACM workshop on Quality of protection
A constraint based role based access control in the SECTET a model-driven approach
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Security benchmarks of OSGi platforms: toward Hardened OSGi
Software—Practice & Experience
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
Electronic Notes in Theoretical Computer Science (ENTCS)
A pattern-driven security advisor for service-oriented architectures
Proceedings of the 2009 ACM workshop on Secure web services
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation
Proceedings of the 2009 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the Eighth SoMeT_09
MoDELS'06 Proceedings of the 2006 international conference on Models in software engineering
RELAW '09 Proceedings of the 2009 Second International Workshop on Requirements Engineering and Law
Model-based security and dependability patterns in RCES: the TERESA approach
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems
Security, privacy, and dependability in smart homes: a pattern catalog approach
ICOST'10 Proceedings of the Aging friendly technology for health and independence, and 8th international conference on Smart homes and health telematics
Goal-oriented security threat mitigation patterns: a case of credit card theft mitigation
Proceedings of the 16th Conference on Pattern Languages of Programs
Towards a better integration of patterns in secure component-based systems design
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Exploring information security issues in public sector inter-organizational collaboration
EGOV'11 Proceedings of the 10th IFIP WG 8.5 international conference on Electronic government
Facilitating the use of TPM technologies using the serenity framework
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Towards a MOF/QVT-Based domain architecture for model driven security
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Supporting security sensitive architecture design
QoSA'05 Proceedings of the First international conference on Quality of Software Architectures and Software Quality, and Proceedings of the Second International conference on Software Quality
A framework for exploiting security expertise in application development
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Privacy analysis using ontologies
Proceedings of the second ACM conference on Data and Application Security and Privacy
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
ER'05 Proceedings of the 24th international conference on Conceptual Modeling
A semantic representation for domain-specific patterns
MIS'04 Proceedings of the 2004 international conference on Metainformatics
Assessment of a framework for designing and evaluating security sensitive architecture
EASE'08 Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering
Evaluation of the Pattern-based method for Secure Development (PbSD): A controlled experiment
Information and Software Technology
A security-focused engineering process for systems of embedded components
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
Organizational Patterns for Security and Dependability: From Design to Application
International Journal of Secure Software Engineering
Hi-index | 0.00 |