supporting the design of security architectures. In future works, we have planned to
formalize and develop each of the components included in the framework defined.
Acknowledgements
This research has been carried out in the framework of the following projects:
MODEL-CAOS (TIN2008-03582/TIN) financed by the Spanish Ministry of
Education and Science, BUSINESS (PET2008-0136) financed by the Ministry of
Science and Innovation, and SISTEMAS (PII2I09-0150-3135) and SERENIDAD
(PEII11-0327-7035), all financed by the Local Government of Castilla-La Mancha, in
Spain.
References
1. (ISC)
2
. (2011). The International Information Systems Security Certification Consortium,
from http://www.isc2.org/
2. Biolchini, J., Mian, P. G., Natali, A. C. C. and Travassos, G. H. (2005). Systematic Review
in Software Engineering. Systems Engineering and Computer Science Department COPPE
/ UFRJ: Rio de Janeiro.
3. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P. and Stal., M. (1996). Pattern-
oriented software architecture: A system of patterns. Wiley.
4. Fernandez, E., Washizaki, H., Yoshioka, N., Kubo, A. and Fukazawa, Y. (2008).
Classifying Security Patterns Progress in WWW Research and Development (pp. 342-347).
5. Fernandez, E. B., Washizaki, H. and Yoshioka, N. (2008). Abstract security patterns.
Proceedings of the 15th Conference on Pattern Languages of Programs, Nashville,
Tennessee.
6. Hafiz, M., Adamczyk, P. and Johnson, R. E. (2007). Organizing Security Patterns.
Software, IEEE, 24(4), 52-60.
7. IC3. (2009). 2009 Internet Crime Report: Internet Crime Complaint Center.
8. ISACA. (2011). Information Systems Audit and Control Association, from http://
www.isaca.org/
9. ISF. (2011). The Information Security Forum - the world's leading independent authority on
information security, from https://www.securityforum.org/
10. Kerth, N. L. and Cunningham, W. (1997). Using Patterns to Improve Our Architectural
Vision. IEEE Software, 23, 53-59.
11. Kienzle, D. M., Elder, M. C., Tyree, D. and Edwards-Hewitt, J. (2006). Security patterns
repository, version 1.0.
12. Kitchenham, B. (2004). Procedures for Perfoming Systematic Review. Joint Technical
Report, Software Engineering Group, Department of Computer Scinece Keele University,
United Kingdom and Empirical Software Engineering, National ICT Australia Ltd.:
Australia.
13. Moral-García, S., Ortiz, R., Moral-Rubio, S., Vela, B., Garzás, J. and Fernández-Medina, E.
(2010). A new Pattern Template to Support the Design of Security Architectures.
PATTERNS 2010, The second International Conference on Pervasive Patterns and
Applications, Lisbon (Portugal). pp. 66-71
14. Okubo, T. and Tanaka, H. (2008). Web security patterns for analysis and design.
Proceedings of the 15th Conference on Pattern Languages of Programs, Nashville,
Tennessee.
23