H. Mouratidis, P. Giorgini, and G. Manson, When security meets software engineering, Inf. Syst, vol.30, issue.8, pp.609-629, 2005.

I. Flechais, C. Mascolo, and M. A. Sasse, Integrating security and usability into the requirements and design process, Int. J. Electron. Secur. Digit. Forensic, vol.1, issue.1, pp.12-26, 2007.

,

N. Yoshioka, H. Washizaki, and K. Maruyama, A survey on security patterns, Progress in Informatics, vol.5, pp.35-47, 2008.

, Common weakness enumeration

, Security pattern catalog

A. K. Alvi and M. Zulkernine, A Natural Classification Scheme for Software Security Patterns, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp.113-120, 2011.

S. Konrad, B. H. Cheng, L. Campbell, and R. Wassermann, Using Security Patterns to Model and Analyze Security Requirements, 2nd International Workshop on Requirements Engineering for High Assurance Systems, pp.13-22, 2003.

T. Ahmed and A. R. Tripathi, Static verification of security requirements in role based CSCW systems, Proceedings of the eighth ACM symposium on Access control models and technologies-SACMAT '03, p.196, 2003.

M. , R. Abdunabi, R. B. France, and I. Ray, An Approach to Analyzing Temporal Properties in UML Class Models, pp.77-86, 2013.

C. Bouhours, H. Leblanc, C. Percebois, and T. Millan, Detection of generic micro-architectures on models, The Second International Conferences on Pervasive Patterns and Applications, pp.34-41, 2010.
URL : https://hal.archives-ouvertes.fr/hal-02042297

T. Millan, L. Sabatier, T. T. Le-thi, P. Bazex, and C. Percebois, An ocl extension for checking and transforming uml models, proceedings of the 8th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS), pp.144-150, 2009.

S. Merz and C. Rauh, Model checking timed uml state machines and collaborations, 7th Intl. Symp. Formal Techniques in Real-Time and Fault Tolerant Systems, pp.395-414, 2002.

G. Holzmann, Spin Model Checker, the: Primer and Reference Manual, 2003.

K. P. Yoon and C. Hwang, Multiple attribute decision making: An introduction (quantitative applications in the social sciences), 1995.

, Overview of the moodle question engine

, Owasp testing guide v3.0 project, OWASP, 2003.

C. Steel, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, 2005.