When security meets software engineering, Inf. Syst, vol.30, issue.8, pp.609-629, 2005. ,
Integrating security and usability into the requirements and design process, Int. J. Electron. Secur. Digit. Forensic, vol.1, issue.1, pp.12-26, 2007. ,
,
A survey on security patterns, Progress in Informatics, vol.5, pp.35-47, 2008. ,
, Common weakness enumeration
, Security pattern catalog
A Natural Classification Scheme for Software Security Patterns, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp.113-120, 2011. ,
Using Security Patterns to Model and Analyze Security Requirements, 2nd International Workshop on Requirements Engineering for High Assurance Systems, pp.13-22, 2003. ,
Static verification of security requirements in role based CSCW systems, Proceedings of the eighth ACM symposium on Access control models and technologies-SACMAT '03, p.196, 2003. ,
An Approach to Analyzing Temporal Properties in UML Class Models, pp.77-86, 2013. ,
Detection of generic micro-architectures on models, The Second International Conferences on Pervasive Patterns and Applications, pp.34-41, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-02042297
An ocl extension for checking and transforming uml models, proceedings of the 8th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS), pp.144-150, 2009. ,
Model checking timed uml state machines and collaborations, 7th Intl. Symp. Formal Techniques in Real-Time and Fault Tolerant Systems, pp.395-414, 2002. ,
, Spin Model Checker, the: Primer and Reference Manual, 2003.
Multiple attribute decision making: An introduction (quantitative applications in the social sciences), 1995. ,
, Overview of the moodle question engine
, Owasp testing guide v3.0 project, OWASP, 2003.
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, 2005. ,