REFERENCES
Barnum, S. (2008). Common Attack Pattern Enumera-
tion and Classification (CAPEC) Schema Descrip-
tion. Cigital Inc., http://capec.mitre.org/about/ doc-
uments.html.
Barnum, S. and Sethi, A. (2006). Introduction to at-
tack patterns. Technical report, U.S. Dept. of
Homeland Security, https://buildsecurityin.us-
cert.gov/daisy/bsi/articles/knowledge/attack/585-
BSI.html.
Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M.,
and Khalil, M. (2007). Lessons from applying the sys-
tematic literature review process within the software
engineering domain. Journal of Systems and Software,
80(4):571–583.
Buschmann, F., Henney, K., and Schmidt, D. C. (2007).
Pattern-Oriented Software Architecture Volume 4: A
Pattern Language for Distributed Computing. Wiley
& Sons.
Fernandez, E. B., Fonoage, M., VanHilst, M., and Marta, M.
(2008). The secure three-tier architecture pattern. In
Proc. of International Conference on Complex, Intelli-
gent and Software Intensive Systems, pages 555–560,
Los Alamitos, CA, USA. IEEE Computer Society.
Fernandez, E. B. and Pan, R. (2001). A pattern language
for security models. In Proceedings of PLoP 2001
Conference.
Fernandez, E. B. and Yuan, X. (2007). Securing analysis
patterns. In ACM-SE 45: Proceedings of the 45th an-
nual southeast regional conference, pages 288–293,
New York, NY, USA. ACM.
Gamma, E., Helm, R., Johnson, R., and Vlissides, J.
(1995). Design Patterns: Elements of Reusable
Object-Oriented Software. Addison-Wesley.
Hafiz, M., Adamczyk, P., and Johnson, R. E. (2007). Orga-
nizing security patterns. IEEE Software, 24(4):52–60.
Hafiz, M. and Johnson, R. E. (2006). Security patterns and
their classification schemes.
Halkidis, S. T., Chatzigeorgiou, A., and Stephanides, G.
(2004). A qualitative evaluation of security patterns.
In Proceedings of the 6th International Conference on
Information and Communications Security (ICICS),
pages 132–144, Malaga, Spain. Springer.
Heyman, T., Yskout, K., Scandariato, R., and Joosen, W.
(2007). An analysis of the security patterns landscape.
In SESS ’07: Proceedings of the Third International
Workshop on Software Engineering for Secure Sys-
tems, page 3, Washington, DC, USA. IEEE Computer
Society.
Hoglund, G. and McGraw, G. (2004). Exploiting Software
- How to Break Code. Addison Wesley.
Horvath, V. and D¨orges, T. (2008). From security patterns
to implementation using petri nets. In SESS ’08: Pro-
ceedings of the fourth international workshop on Soft-
ware engineering for secure systems, pages 17–24,
New York, NY, USA. ACM.
Howard, M. and Lipner, S. (2006). The Security Develop-
ment Lifecycle. Microsoft Press.
Kienzle, D. M. and Elder, M. C. (2001). Final
technical report: Security patterns for web
application development. Technical report,
http://www.scrypt.net/˜celer/securitypatterns/final
Kienzle, D. M., Elder, M. C., Tyree, D., and
Edwards-Hewitt, J. (2002). Security pat-
terns repository version 1.0. Technical report,
http://www.scrypt.net/˜celer/securitypatterns/ reposi-
tory.pdf.
Kitchenham, B. (2004). Procedures for undertaking sys-
tematic reviews. Technical report, Computer Science
Department, Keele University (TR/SE-0401) and Na-
tional ICT Australia Ltd (0400011T.1).
Markus Schumacher, Eduardo Fernandez-Buglioni, D. H.
F. B. P. S. (2005). Security Patterns. Integrating Se-
curity and Systems Engineering (Wiley Series in Soft-
ware Design Patterns). Wiley & Sons.
McGraw, G. (2006). Software Security: Building Security
In. Addison-Wesley.
Romanosky, S. (2001). Security design patterns. Tech-
nical report, http://www.cgisecurity.com/lib/ security-
DesignPatterns.pdf.
Schumacher, M. (2002). Security patterns. Informatik Spek-
trum, Juni 2002:220–223.
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D.,
Buschmann, F., and Sommerlad, P. (2006). Security
Patterns : Integrating Security and Systems Engineer-
ing (Wiley Software Patterns Series). John Wiley &
Sons.
Steel, C., Nagappan, R., and Lai, R. (2005). Core Security
Patterns: Best Practices and Strategies for J2EE(TM),
Web Services, and Identity Management. Prentice Hall
PTR.
Trowbridge, D., Cunningham, W., Evans, M.,
Brader, L., and Slater, P. (2004). Describ-
ing the Enterprise Architectural Space. Mi-
crosoft, http://msdn.microsoft.com/enus/library/
ms978655.aspx.
Viega, J. and McGraw, G. (2001). Building Secure Soft-
ware: How to Avoid Security Problems the Right Way.
Addison-Wesley Professional.
Weiss, M. and Mouratidis, H. (2008). Selecting security
patterns that fulfill security requirements. In IEEE In-
ternational Conference on Requirements Engineering,
pages 169–172. IEEE Computer Society.
Yoder, J. and Barcalow, J. (1997). Architectural patterns
for enabling application security. In Proceedings of
the 4th Conference on Patterns Language of Program-
ming (PLoP’97).
Yoshioka, N., Washizaki, H., and Maruyama, K. (2008). A
survey on security patterns. Progress in Informatics,
(5):35–47.
SECRYPT 2009 - International Conference on Security and Cryptography
394