Acknowledgements
We wish to acknowledge Paul Black of NIST for his participation in the initial dis-
cussion of using a matrix of concerns for developing secure systems.
References
1. Common Criteria, http://www.commoncriteriaportal.org/
2. Blakley, B., Heath, C., members of The Open Group Security Forum: Technical Guide:
Security Design Patterns. The Open Group, UK, April 2004.
3. Delessy, N., Fernandez, E.B.: Patterns for the eXtensible Access Control Markup Lan-
guage. Proc. 12th Pattern Languages of Programs Conference, Monticello, Illinois, USA,
(2005) http://hillside.net/plop/2005/proceedings/
4. Fernandez, E.B., Yuan, X.: Semantic Analysis Patterns. Proc. 19th Int. Conf. on Concep-
tual Modeling (2000), 183-195 http://www.cse.fau.edu/~ed/SAPpaper2.pdf
5. Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: A Methodology to
Develop Secure Systems Using Patterns. In: Mouratidis, H., Giorgini, P. (Eds.): Integrating
Security and Software Engineering: Advances and Future Vision. IDEA Press (2006) 107-
126
6. Fernandez, E.B., VanHilst, M., Larrondo Petrie, M.M., Huang, S.: Defining Security Re-
quirements through Misuse Actions. In: Ochoa, S.F., Roman, G.-C. (Eds.): Advanced
Software Engineering: Expanding the Frontiers of Software Technology, International Fed-
eration for Information Processing, Springer (2006) 123-137
7. Fernandez, E.B., VanHilst, M., Pelaez, J.C.: Patterns for WiMax Security. Proc. EuroPLoP
(2007) http://hillside.net/europlop/home.html
8. Fernandez, E.B., Washizaki, H., Yoshioka, N., Kubo, A., Fukazawa, Y.: Classifying Secu-
rity Patterns. Proc. 10th Asia-Pacific Web Conference, Shenyang, China, April 26-28
(2008)
9. German D., Cowan, D.: Towards a Unified Catalog of Hypermedia Design Patterns. Proc.
33rd Hawaii International Conference on System Sciences, Maui, Hawaii, (2000)
10. Federal Information Security Management Act (FISMA), March 18, 2007,
http://iase.disa.mil/fisma/index.html
11. Senate Banking Committee: Gramm-Leach-Bliley Act, Monday, November 1 (1999)
http://www.senate.gov/~banking/conf/fincon.pdf
12. Hafiz, M., Adamczyk, P., Johnson, R.E.: Organizing Security Patterns. IEEE Software,
24(4), July/August (2007) 52-60
13. United States Department of Health and Human Services, Office of Civil Rights: Health
Insurance Portability and Accountability Act of 1996. http://www.hhs.gov/ocr/hipaa/
14. Hoglan, G., McGraw, G.: Exploiting Software: How to Break Code. Addison-Wesley
(2004)
15. Howard, M., LeBlanc, D.: Writing Secure Code, (2nd Ed.). Microsoft Press (2003)
16. Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft Press (2006)
17. Leveson, N.: A New Accident Model for Engineering Safer Systems. Safety Science,
42(4), April (2004) 237-270
18. Lipner, S., Howard, M.: The Trustworthy Computing Development Lifecycle,
http://msdn2.microsoft.com/en-us/library/ms995349.aspx, March (2005)
19. McGraw, G.: Software Security: Building Security. Addison-Wesley (2006)
97