{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:40Z","timestamp":1725490480568},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_23","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T17:48:03Z","timestamp":1188323283000},"page":"262-272","source":"Crossref","is-referenced-by-count":1,"title":["Defining Security Architectural Patterns Based on Viewpoints"],"prefix":"10.1007","author":[{"given":"David G.","family":"Rosado","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Guti\u00e9rrez","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Fern\u00e1ndez-Medina","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Piattini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","first-page":"1088","volume-title":"Core Security Patterns","author":"C. Steel","year":"2005","unstructured":"Steel, C., Nagappan, R., Lai, R.: Core Security Patterns, p. 1088. Prentice Hall, Englewood Cliffs (2005)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Bachmann, F., Bass, L., Clements, P., Garlan, D., Ivers, J., Little, R., Nord, R., Stafford, J.: Documenting Software Architectures: Organization of Documentation Package, Software Engineering Institute (2001)","DOI":"10.21236\/ADA389161"},{"key":"23_CR3","unstructured":"Cheng, B.H.C., Konrad, S., Campbell, L.A., Wassermann, R.: Using Security Patterns to Model and Analyze Security Requirements. Monterey Bay, CA, USA, pp. 13\u201322 (2003)"},{"key":"23_CR4","unstructured":"Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F.: Security Patterns, 1st edn., pages. 512. John Wiley & Sons, Chichester (2005)"},{"key":"23_CR5","unstructured":"Schumacher, M., Roedig, U.: Security Engineering with Patterns. In: 8th Conference on Patterns Lnaguages of Programs, PLoP 2001, Monticello, Illinois, USA (2001)"},{"key":"23_CR6","unstructured":"Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security, Monticello, Illinois, USA (1997)"},{"key":"23_CR7","unstructured":"IEEE, Recommended Practice for Architectural Description of Software-Intensive Systems (IEEE Std 1471-2000). Institute of Electrical and Electronics Engineers: New York, NY, p. 29 (2000), http:\/\/standards.ieee.org\/reading\/ieee\/std_public\/description\/se\/1471-2000_desc.html"},{"issue":"6","key":"23_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P. Kruchten","year":"1995","unstructured":"Kruchten, P.: Architectural Blueprints - The \u201c4+1\u201d View Model of Software Architecture. IEEE Software\u00a012(6), 42\u201350 (1995)","journal-title":"IEEE Software"},{"key":"23_CR9","first-page":"576","volume-title":"Software Systems Architecture: Working With Stakeholders Using Viewpoints and Perspectives","author":"N. Rozanski","year":"2005","unstructured":"Rozanski, N., Woods, E.i.: Software Systems Architecture: Working With Stakeholders Using Viewpoints and Perspectives, 1st edn., p. 576. Addison Wesley, Reading (2005)","edition":"1"},{"key":"23_CR10","unstructured":"Berry, C.A., Carnell, J., Juric, M.B., Kunnumpurath, M.M., Nashi, N., Romanosky, S.: Patterns Applied to Manage Security, in J2EE Design Patterns Applied, Ch. 5 (2002)"},{"key":"23_CR11","unstructured":"Kienzle, D.M., Elder, M.C.: Final Technical Report: Security Patterns for web Application Development (2005)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Firesmith, D.G.: Commom Concepts Underlying Safety, Security, and Survivability Engineering CMU\/SEI-2003-TN-033. SEI (2003)","DOI":"10.21236\/ADA421683"},{"key":"23_CR13","first-page":"476","volume-title":"Pattern-Oriented Software Architecture: A System of Patterns","author":"F. Buschmann","year":"1996","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., Stal, M.: Pattern-Oriented Software Architecture: A System of Patterns, p. 476. John Wiley & Sons, Chichester (1996)"},{"key":"23_CR14","unstructured":"Fernandez, E.B., Pan, R.: A pattern language for security models. In: 8th Conference on Pattern Languages of Programs, PLoP 2001. Allerton Park, Illinois, USA (2001)"},{"key":"23_CR15","unstructured":"Security Design Patterns (2001), Available on: http:\/\/www.cgisecurity.com\/lib\/securityDesignPatterns.html"},{"key":"23_CR16","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1994)"},{"key":"23_CR17","unstructured":"AGCS, AG Communication System. Template Pattern (1996)"},{"key":"23_CR18","first-page":"358","volume-title":"A Study of Security Architectural Patterns","year":"2006","unstructured":"Rosado, D.G., Guti\u00e9rrez, C., Fernandez-Medina, E., Piattini, M. (eds.): A Study of Security Architectural Patterns, Vienna, Austria, pp. 358\u2013365. IEEE Computer Society, Los Alamitos (2006)"},{"key":"23_CR19","unstructured":"Software Architecture Document (SAD) (2006) Available on: www.sei.cmu.edu\/architecture\/SAD_template2.dot"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/3-540-45314-8_14","volume-title":"Fundamental Approaches to Software Engineering","author":"J. Jurjens","year":"2001","unstructured":"Jurjens, J.: Towards Secure Systems Development with UMLsec. In: Hussmann, H. (ed.) ETAPS 2001 and FASE 2001. LNCS, vol.\u00a02029, pp. 187\u2013200. Springer, Heidelberg (2001)"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"UML 2002","author":"J. Jurjens","year":"2002","unstructured":"Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"UML 2002","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"23_CR23","first-page":"270","volume-title":"Writing Effective Use Cases","author":"A. CockBurn","year":"2000","unstructured":"CockBurn, A.: Writing Effective Use Cases, p. 270. Addison-Wesley Professional, Reading (2000)"},{"key":"23_CR24","volume-title":"Second International Conference on Service Oriented Computing (ICSOC)","author":"M. Deubler","year":"2004","unstructured":"Deubler, M., Gr\u00fcnbauer, J., J\u00fcrjens, J., Wimmel, G.: Sound Development of Secure Service-based Systems. In: Second International Conference on Service Oriented Computing (ICSOC), ACM Press, New York (2004)"},{"key":"23_CR25","first-page":"278","volume-title":"Large-Scale Software Architecture","author":"J. Garlan","year":"2002","unstructured":"Garlan, J., Anthony, R.: Large-Scale Software Architecture, p. 278. John Wiley & Sons, Chichester (2002)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:33:19Z","timestamp":1619505199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_23","relation":{},"subject":[]}}