Avgeriou P (2003) Describing, instantiating and evaluating a reference architecture: a case study. Enterp Archit J 342:1–24
Google Scholar
Blakeley B, Heath C (2004) Members of the open group security forum: technical guide: security design patterns. The Open Group, London http://www.opengroup.org/bookstore/catalog/g031.htm.
Brambilla M et al (2017) “Model-driven development of user interfaces for IoT systems via domain-specific components and patterns. J Internet Serv Appl 8(1):1–21
Article
Google Scholar
Buschmann F, Meunier R, Rohnert H, Sommerland P, Stal M (1996) Pattern- oriented software architecture. Wiley, New York
Google Scholar
Dong J, Alencar P, Cowan D (2007) Formal specification and verification of design patterns, chapter 5. In: Taibi T (ed.) Design pattern formalization techniques. IGI Publishing, pp 94–108
Fernandez EB (2013) Security patterns in practice: building secure architectures using software patterns. Wiley series on software design patterns. Wiley, New York
Google Scholar
Fernandez EB, Yoshioka N (2018) Using a variety of patterns in a secure software development methodology. In: Proceedings 25th Asia-Pacific software engineering conference, Nara, Japan
Fernandez EB, Washizaki H, Yoshioka N (2008) Abstract security patterns. In: Position paper in Proceedings of the 2nd workshop on software patterns and quality (SPAQu'08), in conjunction with the 15th conference on pattern languages of programs (PLoP 2008), October 18–20, Nashville, TN
Fernandez EB, Mujica S, Valenzuela f (2011) Two security patterns: least privilege and security logger/auditor. In: Proceedings of Asian PLoP. http://patterns-wg.fuka.info.waseda.ac.jp/asianplop/proceedings2011/asianplop2011_submission_7.pdf
Fernandez EB, Yoshioka N, Washizaki H, Yoder J (2014) Abstract security patterns for requirements specification and analysis of secure systems. In: Proceedings of the WER 2014 conference, a track of the 17th Ibero-American conference on software engineering (CIbSE 2014), Pucon, Chile
Fernandez EB, Monge R, Hashizume K (2015) Building a security reference architecture for cloud systems. Requir Eng. https://doi.org/10.1007/s00766-014-0218-7
Article
Google Scholar
Fernandez EB, Washizaki H, Yoshioka N (2016) Patterns for secure cloud IaaS. In: 5th Asian conference on pattern languages of programs (AsianPLoP)
Fernandez EB, Yoshioka N, Washizaki H (2018) An abstract security pattern for Authentication and a derived concrete pattern, the Credential-based Authentication. In: Asian pattern languages of programs conference (AsianPLoP)
Fernandez EB, Yoshioka N, Washizaki H (2019) Abstract and IoT security patterns for network segmentation. In: Proceedings of the 8th Asian conference on pattern languages of programs (Asian PLoP)
Fernandez EB, Yoshioka N, Washizaki H (2020) Secure distributed publish/subscribe (P/S) pattern for IoT. AsianPLoP
Fernandez EB, Washizaki H, Yoshioka N, Okubo T (2021) The design of secure IoT applications using patterns: State of the art and directions for research. Internet Things 15:100408. https://doi.org/10.1016/j.iot.2021.100408
Article
Google Scholar
Fowler M (1997) Analysis patterns—reusable object models. Addison-Wesley, Reading
Google Scholar
Gamma E, Helm R, Johnson R, Vlissides J (1994) Design patterns—elements of reusable object-oriented software. Addison-Wesley, Reading
MATH
Google Scholar
Gollmann D (2011) Computer security, 3rd edn. Wiley, New York
Google Scholar
Hamid B, Gürgens S, Fuchs A (2016) Security patterns modeling and formalization for pattern-based development of secure software systems. Innov Syst Softw Eng 12:109–140. https://doi.org/10.1007/s11334-015-0259-1
Article
Google Scholar
Hatebur D, Heisel M, Schmidt H (2007) A pattern system for security requirements engineering. In: Proceedings of ARES, pp 356–365
Howard M (2006) The security development lifecycle: SDL: a process for developing demonstrably more secure software, 1st edn. Microsoft Press, Redmond
Google Scholar
Jackson M (2001) Problem frames: analyzing & structuring software development problems. Addison-Wesley, Reading
Google Scholar
Le Guennec A, Sunyé G, Jézéquel J-M (2000) Precise modeling of design patterns. In: International conference on the unified modeling language, pp 482–496
Maña A, Fernandez EB, Ruiz J, Rudolph C (2013) Towards computer-based security patterns. In: 20th Conference on pattern languages of programs (PLoP)
Moral-García S, Moral-Rubio S, Rosado DG, Fernández EB, Fernández-Medina E (2014) Enterprise security pattern: a new type of security pattern. Secur Commun Netw (wiley) 7(11):1670–1690. https://doi.org/10.1002/sec.863
Article
Google Scholar
Morrison P, Fernandez EB (2006) The credential pattern. In: Proceedings of the conference on pattern languages of programs, PLoP 2006, Portland, OR. http://hillside.net/plop/2006/
Mouratidis H, Weiss M, Georgini P (2006) Modelling secure systems using an agent-oriented approach and security patterns. Int J Soft Eng Knowl Eng 16(3):471–498
Article
Google Scholar
Pereira-Vale A, Fernandez EB (2019) An ontology for security patterns. In: 38th International conference of the chilean computer science society (SCCC 2019), Concepción—Chile. November 4–8
Polya G (1957) How to solve it, 2nd edn. Doubleday Anchor Books, New York
MATH
Google Scholar
Priebe T, Fernandez EB, Mehlau JI, Pernul G (2004) A pattern system for access control. In: Research directions in data and applications security XVIII, Farkas C, Samarati P (Eds.) Proceedings of the 18th annual IFIP WG 11.3 working conference on da-ta and applications security, Sitges, Spain, July 25–28
Rumbaugh J, Jacobson I, Booch G (1999) The unified modeling language reference manual. Addison-Wesley, Boston
Google Scholar
Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308
Article
Google Scholar
Schumacher M, Fernandez EB, Hybertson D, Buschmann F, Sommerlad P (2006) Security patterns: integrating security and systems engineering. Wiley, New York
Google Scholar
Song Z, Li Z, Dou W (2003) Different approaches for the formal definition of authentication property. In: 9th Asia-Pacific conference on communications
Steel C, Nagappan R, Lai R (2005) Core security patterns: best strategies for J2EE, web services, and identity management. Prentice Hall, Upper Saddle River
Google Scholar
Taylor RN, Medvidovic N, Dashofy N (2010) Software architecture: foundation, theory, and practice. Wiley, New York
Google Scholar
Uzunov AV, Fernandez EB (2021) Cryptography-based security patterns and security solution frames for networked and distributed systems. Submitted for publication (available from the authors)
Uzunov A, Fernandez EB, Falkner K (2015a) Security solution frames and security patterns for authorization in distributed, collaborative systems. Comput Secur 55:193–234. https://doi.org/10.1016/j.cose.2015.08.003
Article
Google Scholar
Uzunov A, Fernandez EB, Falkner K (2015b) ASE: a comprehensive pattern-driven security methodology for distributed systems. J Comput Stand Interfaces 41:112–137. https://doi.org/10.1016/j.csi.2015.02
Article
Google Scholar
van Heesch U, Hezavehi SM, Avgeriou P (2011) Combining architectural patterns and software technologies in one design language. In: Proceedings of the 16th European conference on pattern languages of programs (EuroPLoP)
Villagran-Velasco O, Fernandez EB, Ortega-Arjona J (2020) Refining the evaluation of the degree of security of a system built using security patterns. In: Proceedings 15th international conference on availability, reliability and security (ARES 2020), Dublin, Ireland
Warmer J, Kleppe A (2003) The object constraint language, 2nd edn. Addison-Wesley, Reading
Washizaki H, Fernandez EB, Maruyama K, Kubo A, Yoshioka N (2009a) Improving the classification of security patterns. In: Proceedings 20th international workshop on database and expert systems application, pp 165–170
Washizaki H, Fernandez EB, Maruyama K, Kubo A, Yoshioka N (2009b) Improving the classification of security patterns. In: 20th International workshop on database and expert systems application, pp 165–170
Washizaki H, Hazeyama A, Okubo T, Kanuka H, Ogata S, Yoshioka N (2021) Analysis of IoT pattern descriptions. In: SERP4IoT
Yoder J, Barcalow J (2000) Architectural patterns for enabling application security. In: Harrison N, Foote B, Rohnert H (eds.) Proceedings PLOP’97, Also, Chapter 15 in pattern languages of program design, vol 4. Addison-Wesley