ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Security protocols, properties, and their monitoring
Proceedings of the fourth international workshop on Software engineering for secure systems
Patterns for session-based access control
Proceedings of the 2006 conference on Pattern languages of programs
Proceedings of the 2006 conference on Pattern languages of programs
Even more patterns for secure operating systems
Proceedings of the 2006 conference on Pattern languages of programs
Applying patterns to build a lightweight middleware for embedded systems
Proceedings of the 2006 conference on Pattern languages of programs
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A High-level Aspect-oriented-based Framework for Software Security Hardening
Information Security Journal: A Global Perspective
Comprehensible security synthesis for wireless sensor networks
Proceedings of the 3rd international workshop on Middleware for sensor networks
Organizational aspect of trusted legally valid long-term electronic archive solution
WSEAS Transactions on Information Science and Applications
Experimental comparison of attack trees and misuse cases for security threat identification
Information and Software Technology
Multiple design patterns for voice over IP security
Proceedings of the International Conference on Advances in Computing, Communication and Control
Security-oriented program transformations
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
On building secure SCADA systems using security patterns
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09)
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
On lightweight mobile phone application certification
Proceedings of the 16th ACM conference on Computer and communications security
Flexible integration of data qualities in wireless sensor networks
Proceedings of the 4th International Workshop on Middleware Tools, Services and Run-Time Support for Sensor Networks
Validating complex interactions in air traffic management
HSI'09 Proceedings of the 2nd conference on Human System Interactions
Automated verification of security pattern compositions
Information and Software Technology
Proceedings of the 15th Conference on Pattern Languages of Programs
Proceedings of the 15th Conference on Pattern Languages of Programs
Patterns for the secure and reliable execution of processes
Proceedings of the 15th Conference on Pattern Languages of Programs
Security patterns for physical access control systems
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Proceedings of the 14th Conference on Pattern Languages of Programs
Patterns for access control in distributed systems
Proceedings of the 14th Conference on Pattern Languages of Programs
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Distributed system for access control to physical resources based on qualifications
SEPADS'10 Proceedings of the 9th WSEAS international conference on Software engineering, parallel and distributed systems
WSEAS Transactions on Systems and Control
Contract-based cloud architecture
CloudDB '10 Proceedings of the second international workshop on Cloud data management
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs
Proceedings of the first ACM conference on Data and application security and privacy
A tool-supported method for the design and implementation of secure distributed applications
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
An architecture-centric approach to detecting security patterns in software
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Main types of attacks in wireless sensor networks
SSIP '09/MIV'09 Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies
Applicability of security patterns
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Evaluation of web application security risks and secure design patterns
Proceedings of the 2011 International Conference on Communication, Computing & Security
Experiences in using patterns to support process experts in process description and wizard creation
Transactions on pattern languages of programming II
Modeling design patterns with description logics: a case study
CAiSE'11 Proceedings of the 23rd international conference on Advanced information systems engineering
A method for security governance, risk, and compliance (GRC): a goal-process approach
Foundations of security analysis and design VI
Exploring information security issues in public sector inter-organizational collaboration
EGOV'11 Proceedings of the 10th IFIP WG 8.5 international conference on Electronic government
Facilitating the use of TPM technologies using the serenity framework
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Towards systematic integration of quality requirements into software architecture
ECSA'11 Proceedings of the 5th European conference on Software architecture
Towards a MOF/QVT-Based domain architecture for model driven security
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Design patterns selection: An automatic two-phase method
Journal of Systems and Software
A framework for exploiting security expertise in application development
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Improving security design patterns with aspect-oriented strategies
Proceedings of the 50th Annual Southeast Regional Conference
Evaluation of the Pattern-based method for Secure Development (PbSD): A controlled experiment
Information and Software Technology
The Climate-G Portal: The context, key features and a multi-dimensional analysis
Future Generation Computer Systems
Does organizing security patterns focus architectural choices?
Proceedings of the 34th International Conference on Software Engineering
Reference deployment models for eliminating user concerns on cloud security
The Journal of Supercomputing
Proceedings of the 1st Asian Conference on Pattern Languages of Programs
Growing a pattern language (for security)
Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software
The nature of order: from security patterns to a pattern language
Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity
Point-and-shoot security design: can we build better tools for developers?
Proceedings of the 2012 workshop on New security paradigms
Security asset elicitation for collaborative models
Proceedings of the Workshop on Model-Driven Security
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Formalization of design patterns for security anddependability
Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems
Building high assurance secure applications using security patterns for capability-based platforms
Proceedings of the 2013 International Conference on Software Engineering
ACM Transactions on Software Engineering and Methodology (TOSEM) - In memoriam, fault detection and localization, formal methods, modeling and design
Security for software engineering education
Journal of Computing Sciences in Colleges
Comparing attack trees and misuse cases in an industrial setting
Information and Software Technology
Securing business processes using security risk-oriented patterns
Computer Standards & Interfaces
Enterprise security pattern: A model-driven architecture instance
Computer Standards & Interfaces
Hi-index | 0.00 |