iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-319-93354-2_6
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:20:47Z","timestamp":1726410047064},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319933535"},{"type":"electronic","value":"9783319933542"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93354-2_6","type":"book-chapter","created":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T10:14:37Z","timestamp":1528452877000},"page":"105-129","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Security Pattern Classification Based on Data Integration"],"prefix":"10.1007","author":[{"given":"S\u00e9bastien","family":"Salva","sequence":"first","affiliation":[]},{"given":"Loukmen","family":"Regainia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,9]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Rodriguez, E.: Security Design Patterns, vol. 49 (2003)","DOI":"10.1080\/10246029.2003.9627234"},{"key":"6_CR2","first-page":"1","volume":"2754","author":"M Schumacher","year":"2001","unstructured":"Schumacher, M., Roedig, U.: Security Engineering with Patterns. Engineering 2754, 1\u2013208 (2001)","journal-title":"Engineering"},{"key":"6_CR3","unstructured":"Slavin, R., Niu, J.: Security patterns repository (2016)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Alvi, A.K., Zulkernine, M.: A natural classification scheme for software security patterns. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 113\u2013120 (2011)","DOI":"10.1109\/DASC.2011.42"},{"key":"6_CR5","unstructured":"Yskout, K., Heyman, T., Scandariato, R., Joosen, W.: A system of security patterns (2006)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Alvi, A.K., Zulkernine, M.: A comparative study of software security pattern classifications. In: 2012 Seventh International Conference on Availability, Reliability and Security, pp. 582\u2013589 (2012)","DOI":"10.1109\/ARES.2012.43"},{"issue":"1","key":"6_CR7","first-page":"46","volume":"5","author":"M Bunke","year":"2012","unstructured":"Bunke, M., Koschke, R., Sohr, K.: Organizing security patterns related to security and pattern recognition requirements. Int. J. Adv. Secur. 5(1), 46\u201367 (2012)","journal-title":"Int. J. Adv. Secur."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Anand, P., Ryoo, J., Kazman, R.: Vulnerability-based security pattern categorization in search of missing patterns. In: 2014 Ninth International Conference on Availability, Reliability and Security, pp. 476\u2013483 (2014)","DOI":"10.1109\/ARES.2014.71"},{"key":"6_CR9","unstructured":"Wiesauer, A., Sametinger, J.: A security design pattern taxonomy based on attack patterns. In: International Joint Conference on e-Business and Telecommunications, pp. 387\u2013394 (2009)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Regainia, L., Salva, S.: A methodology of security pattern classification and of attack-defense tree generation. In: Camp, O., Furnell, S., Mori, P., (eds): Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal. SciTePress (2017)","DOI":"10.5220\/0006198301360146"},{"key":"6_CR11","unstructured":"MITRE Corporation: Common attack pattern enumeration and classification (2017)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"JH Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63, 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents","year":"2001","author":"J Viega","key":"6_CR13","unstructured":"Viega, J., McGraw, G.: Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, New York City (2001)"},{"key":"6_CR14","unstructured":"Meier, J., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., Murukan, A.: Improving web application security: threats and countermeasures. Microsoft Corporation 3 (2003)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1007\/3-540-45706-2_126","volume-title":"Euro-Par 2002 Parallel Processing","author":"V Dialani","year":"2002","unstructured":"Dialani, V., Miles, S., Moreau, L., De Roure, D., Luck, M.: Transparent fault tolerance for web services based architectures. In: Monien, B., Feldmann, R. (eds.) Euro-Par 2002. LNCS, vol. 2400, pp. 889\u2013898. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45706-2_126"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2006.109","volume":"4","author":"J Meier","year":"2006","unstructured":"Meier, J.: Web application security engineering. IEEE Secur. Priv. 4, 16\u201324 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Yskout, K., Scandariato, R., Joosen, W.: Do security patterns really help designers? In: Proceedings of the 37th International Conference on Software Engineering, ICSE 2015, vol. 1, pp. 292\u2013302. IEEE Press, Piscataway (2015)","DOI":"10.1109\/ICSE.2015.49"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-78849-2_35","volume-title":"Progress in WWW Research and Development","author":"EB Fernandez","year":"2008","unstructured":"Fernandez, E.B., Washizaki, H., Yoshioka, N., Kubo, A., Fukazawa, Y.: Classifying security patterns. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 342\u2013347. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78849-2_35"},{"key":"6_CR19","unstructured":"Regainia, L., Salva, S.: Security pattern classification, companion site (2018). http:\/\/regainia.com\/research\/companion.html . Accessed 2018"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2012","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Attack-defense trees. J. Logic Comput. 24(1), 55\u201387 (2012)","journal-title":"J. Logic Comput."},{"key":"6_CR21","unstructured":"Munawar, H.: Security pattern catalog (2013). http:\/\/www.munawarhafiz.com\/securitypatterncatalog\/ . Accessed 2018"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"T\u00f8ndel, I.A., Jensen, J., R\u00f8stad, L.: Combining misuse cases with attack trees and security activity models. In: International Conference on Availability, Reliability, and Security, ARES 2010, pp. 438\u2013445. IEEE (2010)","DOI":"10.1109\/ARES.2010.101"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.csi.2013.12.008","volume":"36","author":"AV Uzunov","year":"2014","unstructured":"Uzunov, A.V., Fernandez, E.B.: An extensible pattern-based library and taxonomy of security threats for distributed systems. Comput. Stand. Interfaces 36, 734\u2013747 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Regainia, L., Salva, S., Bouhours, C.: A classification methodology for security patterns to help fix software weaknesses. In: Proceedings of the 13th ACS\/IEEE International Conference on Computer Systems and Applications AICCSA (2016)","DOI":"10.1109\/AICCSA.2016.7945693"},{"key":"6_CR25","unstructured":"MITRE Corporation: Common weakness enumeration (2017)"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-01648-6_34","volume-title":"Models in Software Engineering","author":"D Harb","year":"2009","unstructured":"Harb, D., Bouhours, C., Leblanc, H.: Using an ontology to suggest software design patterns integration. In: Chaudron, M.R.V. (ed.) MODELS 2008. LNCS, vol. 5421, pp. 318\u2013331. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01648-6_34"},{"key":"6_CR27","unstructured":"OWASP: The open web application security project (OWASP) (2017). http:\/\/www.owasp.org"},{"key":"6_CR28","unstructured":"Wassermann, R., Cheng, B.H.: Security patterns. In: PLoP Conference. Michigan State University, Citeseer (2003)"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40196-1_15","volume-title":"Quantitative Evaluation of Systems","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack\u2013defense trees. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 173\u2013176. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40196-1_15"}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93354-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T04:45:17Z","timestamp":1661402717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93354-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319933535","9783319933542"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93354-2_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}