REFERENCES
Abu-Matar, M. and Gomaa, H., 2011, August. Variability
modeling for service oriented product line
architectures. In Software Product Line Conference
(SPLC), 2011 15th International (pp. 110-119). IEEE.
Al-Azzani, S. and Bahsoon, R., 2012, August. SecArch:
Architecture-level evaluation and testing for security.
In Software Architecture (WICSA) and European
Conference on Software Architecture (ECSA), 2012
Joint Working IEEE/IFIP Conference on (pp. 51-60).
Albassam, E., Gomaa, H. and Menascé, D.A., 2016, July.
Model-based Recovery Connectors for Self-adaptation
and Self-healing. In ICSOFT-EA (pp. 79-90).
Basin, D., Clavel, M. and Egea, M., 2011, June. A decade
of model-driven security. In Proceedings of the 16th
ACM symposium on Access control models and
technologies (pp. 1-10). ACM.
Farahmandian, S. and Hoang, D.B., 2017, October. SDS
2
:
A novel software-defined security service for
protecting cloud computing infrastructure. In Network
Computing and Applications (NCA), 2017 IEEE 16th
International Symposium on (pp. 1-8). IEEE.
Fant, J.S., Gomaa, H. and Pettit, R.G., 2015, July.
Integrating and applying architectural design patterns
in space flight software product lines. In Software
Technologies (ICSOFT), 2015 10th International Joint
Conference on (Vol. 1, pp. 1-11). IEEE.
Fernandez-Buglioni, E., 2013. Security patterns in
practice: designing secure architectures using
software patterns. John Wiley & Sons.
Gomaa, H., Menascé, D.A. & Shin, M.E., 2001. Reusable
component interconnection patterns for distributed
software architectures. Proceedings of the 2001
symposium on Software reusability putting software
reuse in context - SSR 01.
Gomaa, H. and Shin, M.E., 2004, July. A multiple-view
meta-modeling approach for variability management
in software product lines. In International Conference
on Software Reuse (pp. 274-285). Springer, Berlin,
Heidelberg.
Gomaa, H., 2005. Designing software product lines with
UML: from use cases to pattern-based software
architectures, Boston: Addison-Wesley.
Gomaa, H. and Shin, M.E., 2007, January. Automated
software product line engineering and product
derivation. In System Sciences, 2007. HICSS 2007.
40th Annual Hawaii International Conference on (pp.
285a-285a). IEEE.
Gomaa, H. and Shin, M.E., 2008. Multiple-view
modelling and meta-modelling of software product
lines. IET software, 2(2), pp.94-122.
Gomaa, H., Hashimoto, K., Kim, M., Malek, S. and
Menascé, D.A., 2010, March. Software adaptation
patterns for service-oriented architectures.
In Proceedings of the 2010 ACM Symposium on
Applied Computing (pp. 462-469). ACM.
Gomaa, H. and Shin, M.E., 2010. Variability modeling in
model-driven software product line engineering. In
Proceedings of the 2nd International Workshop on
Model Driven Product Line Engineering (MDPLE
2010) (p. 65).
Gomaa, H., 2011. Software modeling and design: UML,
use cases, patterns, and software architectures.
Cambridge University Press.
Jürjens, J., 2002, September. UMLsec: Extending UML
for secure systems development. In International
Conference on The Unified Modeling Language (pp.
412-425). Springer, Berlin, Heidelberg.
Lodderstedt, T., Basin, D. and Doser, J., 2002, September.
SecureUML: A UML-based modeling language for
model-driven security. In International Conference on
the Unified Modeling Language (pp. 426-441).
Springer, Berlin, Heidelberg.
Medvidovic, N. and Taylor, R.N., 2010, May. Software
architecture: foundations, theory, and practice.
In Software Engineering, 2010 ACM/IEEE 32nd
International Conference on (Vol. 2, pp. 471-472).
IEEE.
Ren, J., Taylor, R., Dourish, P. and Redmiles, D., 2005,
May. Towards an architectural treatment of software
security: a connector-centric approach. In ACM
SIGSOFT Software Engineering Notes (Vol. 30, No. 4,
pp. 1-7). ACM.
Schneider, R., 2005. Designing Software Product Lines
with UML: From Use Cases to Pattern-Based
Software Architectures. Software Quality
Professional, 7(4), p.46.
Schumacher, M., Fernandez, E.B., Hybertson, D.,
Buschmann, F. and Sommerlad, P., 2006. Security
Patterns, J.
Shin, M.E. and Gomaa, H., 2007. Software modeling of
evolution to a secure application: From requirements
model to software architecture. Sci. Comput.
Program, 66(1), pp.60-70.
Shin, M.E., Malhotra, B., Gomaa, H. and Kang, T., 2012,
July. Connectors for Secure Software Architectures.
In SEKE (pp. 394-399).
Shin, M.E., Gomaa, H., Pathirage, D., Baker, C. and
Malhotra, B., 2016. Design of Secure Software
Architectures with Secure Connectors. International
Journal of Software Engineering and Knowledge
Engineering, 26(05), pp.769-805.
Shin, M., Gomaa, H. and Pathirage, D., 2016, June.
Reusable Secure Connectors for Secure Software
Architecture. In International Conference on Software
Reuse (pp. 181-196). Springer, Cham.
Shin, M., Gomaa, H. and Pathirage, D., 2017. Model-
based Design of Reusable Secure Connectors. In 4st
International Workshop on Interplay of Model-Driven
and Component-Based Software Engineering
(ModComp) 2017 Workshop Pre-proceedings (p. 6).
Taha, A., Trapero, R., Luna, J. and Suri, N., 2017, June. A
Framework for Ranking Cloud Security Services.
In Services Computing (SCC), 2017 IEEE
International Conference on (pp. 322-329). IEEE.
Tzeremes, V. and Gomaa, H., 2018, January. Applying
End User Software Product Line Engineering for
Smart Spaces. In Proceedings of the 51st Hawaii
International Conference on System Sciences.
A Software Product Line Approach for Feature Modeling and Design of Secure Connectors
517