J. Yoder, J. Yoder, J. Barcalow, and J. Barcalow, Architectural patterns for enabling application security, Proceedings of PLoP, vol.51, p.31, 1997.

, Security patterns repository

K. Yskout, R. Scandariato, and W. Joosen, Does organizing security patterns focus architectural choices, Proceedings-International Conference on Software Engineering, pp.617-627, 2012.

A. K. Alvi and M. Zulkernine, A Natural Classification Scheme for Software Security Patterns, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp.113-120, 2011.

K. Alvi, A. , and M. Zulkernine, A Comparative Study of Software Security Pattern Classifications, 2012 Seventh International Conference on Availability, Reliability and Security, pp.582-589, 2012.

P. Anand, J. Ryoo, and R. Kazman, Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns, Ninth International Conference on Availability, Reliability and Security, pp.476-483, 2014.

K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, A system of security patterns, 2006.

E. B. Fernandez, H. Washizaki, N. Yoshioka, A. Kubo, and Y. Fukazawa, Classifying security patterns, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.4976, pp.342-347, 2008.

S. Ardi, D. Byers, and N. Shahmehri, Towards a structured unified process for software security, Proceedings of the 2006 international workshop on Software engineering for secure systems, pp.3-10, 2006.

, Security pattern classification

M. Bunke, R. Koschke, and K. Sohr, Organizing security patterns related to security and pattern recognition requirements, International Journal on Advances in Security, vol.5, 2012.

E. B. Fernandez, Security patterns and secure systems design, pp.233-234, 2007.

D. Harb, C. Bouhours, and H. Leblanc, Using an Ontology to Suggest Software Design Patterns Integration, pp.318-331, 2009.
URL : https://hal.archives-ouvertes.fr/hal-02042311

C. Steel, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, 2005.

, Common weakness enumeration

J. Viega and G. Mcgraw, Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, 2001.

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975.

J. Meier, Web application security engineering, Security & Privacy, IEEE, vol.4, issue.4, pp.16-24, 2006.

J. Scambray and E. Olson, Improving Web Application Security, 2003.

M. R. Stytz, Considering Defense in Depth for Software Applications, IEEE Security and Privacy, vol.2, issue.1, pp.72-75, 2004.

R. Wassermann and B. H. Cheng, Security patterns, 2003.

B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and P. Schweitzer, Attack-defense trees, Journal of Logic and Computation, p.29, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01825088