Art
J-GLOBAL ID:200902293276059954   Reference number:08A0333058

A survey on security patterns

セキュリティパターン技術に関する研究動向
Author (4):
Material:
Issue:Page: 35-47  Publication year: Mar. 2008 
JST Material Number: L4365B  ISSN: 1349-8614  Document type: Article
Article type: 文献レビュー  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (3):
JST classification
Category name(code) classified by JST.
Data protection  ,  Computer system development  ,  Computer networks 
Reference (76):
  • P. T. Devanbu and S. Stubblebine, “Software engineering for security: a roadmap,” in Proceedings of the Conference on The Future of Software Engineering, pp. 227-239, 2000.
  • M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security And Systems Engineering, John Wiley & Sons Inc, 2006.
  • E. Houg, N. R. Mead and T. R. Stehney, “Security quality requirements engineering (square) methodology,” Technical Report CMU/SEI-2005-TR-009, CMU/SEI, 2005.
  • P. Bresciani, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, “Tropos: An agent-oriented software development methodology,” JAAMAS, vol.8, no.3, pp. 203-236, 2004.
  • J. Jiirjens, G. Popp, and G. Wimmel, “Towards using security patterns in model-based system development,” in Proceedings of PLoP 2002 Conference, 2002.
more...
Terms in the title (3):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page