C. Dougherty, K. Sayre, and R. Seacord, Secure design patterns, 2009.

M. Schumacher and U. Roedig, Security Engineering with Patterns, vol.3540407316, 2001.

J. Y. Dangler, Categorization of Security Design Patterns, Electronic Theses and Dissertations.Paper 1119, 2013.

D. M. Kienzle, M. C. Elder, D. Tyree, and J. Edwards-hewitt, , 2002.

M. Hafiz, P. Adamczyk, and R. E. Johnson, Organizing security patterns, IEEE Softw, vol.24, pp.52-60, 2007.
DOI : 10.1109/ms.2007.114

T. Ahmed and A. R. Tripathi, Static verification of security requirements in role based CSCW systems, Proc. eighth ACM Symp. Access Control Model.Technol.SACMAT "03, p.196, 2003.

S. Konrad, B. H. Cheng, L. Campbell, and R. Wassermann, Using Security Patterns to Model and Analyze Security Requirements, Work. Requir.Eng. High Assur.Syst, pp.13-22, 2003.

W. Tian, J. F. Yang, J. Xu, and G. N. Si, Attack model based penetration test for SQL injection vulnerability, Proc.-Int. Comput.Softw. Appl. Conf, pp.589-594, 2012.

M. Schumacher, Security Patterns, Informatik-Spektrum, vol.25, pp.220-223, 2002.

C. Steel, R. Nagappan, and R. Lai, Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management, 2005.

, Open Web Application Security project

, Common Weakness Enumeration

H. Cédricbouhours, C. Leblanc, and . Percebois, Bad smells in design and design patterns, Journal of Object Technology, ETH S.F.I.T, vol.8, issue.3, pp.43-63, 2009.

M. Balser, S. Bäumler, and A. Knapp, Interactive verification of UML state machines, Form. Methods Softw. Eng, pp.434-448, 2004.