{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:39:14Z","timestamp":1743064754961,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_35","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T22:55:47Z","timestamp":1354229747000},"page":"470-482","source":"Crossref","is-referenced-by-count":3,"title":["Secure Middleware Patterns"],"prefix":"10.1007","author":[{"given":"Eduardo B.","family":"Fernandez","sequence":"first","affiliation":[]},{"given":"Anton V.","family":"Uzunov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerland, P., Stal, M.: Pattern- oriented software architecture. Wiley (1996)"},{"key":"35_CR2","unstructured":"Kircher, M., Jain, P.: Pattern-oriented software architecture. Patterns for Resource Management, vol.\u00a03. Wiley (2004)"},{"key":"35_CR3","series-title":"Patterns for Concurrent and Networked Objects","volume-title":"Pattern-Oriented Software Architecture","author":"D. Schmidt","year":"2000","unstructured":"Schmidt, D., Stal, M., Rohnert, H., Buschmann, F.: Pattern-Oriented Software Architecture. Patterns for Concurrent and Networked Objects, vol.\u00a02. John Wiley & Sons, West Sussex (2000)"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.cose.2012.04.005","volume":"31","author":"A.V. Uzunov","year":"2012","unstructured":"Uzunov, A.V., Fernandez, E.B., Falkner, K.: Securing distributed systems using patterns: A survey. Computers & Security\u00a031, 681\u2013703 (2012)","journal-title":"Computers & Security"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Washizaki, H., Yoshioka, N.: Abstract security patterns. In: Procs. of the 2nd Workshop on Software Patterns and Quality (SPAQu 2008) (Position paper), in Conjunction with the 15th Conf. on Pattern Languages of Programs (PLoP), Nashville, TN (2008)","DOI":"10.1145\/1753196.1753198"},{"key":"35_CR6","unstructured":"Voelter, M., Kircher, M., Zdun, U.: Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware. Wiley (2005)"},{"key":"35_CR7","unstructured":"Anderson, R.: Corba Security Service Specification, OMG (2001), http:\/\/www.omg.org\/docs\/formal\/02-03-11.pdf"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., Sundarrajan, S.: Distributed Systems Security: Issues, Processes and Solutions. Wiley (2009)","DOI":"10.1002\/9780470751787"},{"key":"35_CR9","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network Security, 2nd edn. Prentice-Hall (2002)"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Larrondo Petrie, M.M.: Securing design patterns for distributed systems. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, ch. 3, pp. 53\u201366. Auerbach Pubs., Taylor & Francis Group, LLC (2007)","DOI":"10.1201\/9780849379253.ch3"},{"key":"35_CR11","unstructured":"Morrison, P., Fernandez, E.B.: Securing the Broker pattern. In: Procs. of the 11th European Conf. on Pattern Languages of Programs, EuroPLoP (2006)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Ortega-Arjona, J.L.: The Secure Pipes and Filters pattern. In: Procs. of the Third Int. Workshop on Secure System Methodologies Using Patterns (Spattern) (2009)","DOI":"10.1109\/DEXA.2009.55"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Ortega-Arjona, J.L., Fernandez, E.B.: The Secure Blackboard pattern. In: Procs. 15th Int. Conference on Pattern Languages of Programs, PLoP (2008)","DOI":"10.1145\/1753196.1753223"},{"key":"35_CR14","unstructured":"Fernandez, E.B., Ortega-Arjona, J.L.: Securing the Adapter pattern. In: Procs. of the OOPSLA MiniPLoP (2009)"},{"key":"35_CR15","unstructured":"Delessy, N., Fernandez, E.B.: The Secure MVC pattern. Accepted for the First International Symposium on Software Architecture and Patterns, In: Conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology (LACCEI), Panama City, Panama, July 23-27 (2012)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Fonoage, M., VanHilst, M., Larrondo-Petrie, M.M.: The secure three-tier architecture. In: Procs. of the Second Workshop on Engineering Complex Distributed Systems (ECDS 2008), Barcelona, Spain, pp. 555\u2013560 (2008)","DOI":"10.1109\/CISIS.2008.51"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Yoshioka, N., Washizaki, H.: Two patterns for distributed systems: Enterprise Service Bus (ESB) and Distributed Publish\/Subscribe. In: 18th Conference on Pattern Languages of Programs, PLoP (2011)","DOI":"10.1145\/2578903.2579146"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., VanHilst, M., Larrondo Petrie, M.M., Huang, S.: Defining Security Requirements Through Misuse Actions. In: Ochoa, S.F., Roman, G.-C. (eds.) Advanced Software Engineering: Expanding the Frontiers of Software Technology. IFIP, pp. 123\u2013137. Springer US (2006)","DOI":"10.1007\/978-0-387-34831-5_10"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: A methodology to develop secure systems using patterns. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Vision, pp. 107\u2013126. IDEA Press (2006)","DOI":"10.4018\/978-1-59904-147-6.ch005"},{"key":"35_CR20","unstructured":"Fernandez, E.B.: Security Patterns in Practice: Building Secure Architectures using Software Patterns, 1st edn. Wiley Series on Software Design Patterns. Wiley (to appear)"},{"key":"35_CR21","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E. Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: elements of reusable object-oriented software. Addison-Wesley, Boston (1994)"},{"key":"35_CR22","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish\/subscribe. ACM Comput. Surv.\u00a035, 114\u2013131 (2003)","journal-title":"ACM Comput. Surv."},{"key":"35_CR23","unstructured":"Braga, A., Rubira, C., Dahab, R.: Tropyc: A pattern language for cryptographic object-oriented software. In: Harrison, N., Foote, B., Rohnert, H. (eds.) Pattern Languages of Program Design 4, ch. 16. Addison-Wesley (1998)"},{"key":"35_CR24","unstructured":"Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating security and systems engineering. Wiley Series in Software Design Patterns. Wiley (2006)"},{"key":"35_CR25","unstructured":"Zou, X., Ramamurthy, B., Magliveras, S.S.: Secure Group Communications Over Data Networks, 1st edn. Springer (2005)"},{"key":"35_CR26","unstructured":"Brown, F.L., Divietri, J., De Villegas, G.D., Fernandez, E.B.: The Authenticator Pattern. In: Procs. of PLoP 1999 (1999)"},{"key":"35_CR27","unstructured":"Hashizume, K., Fernandez, E.B., Huang, S.: Digital Signature with Hashing and XML Signature patterns. In: Procs. 14th European Conf. on Pattern Languages of Programs, EuroPLoP (2009)"},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Priebe, T., Fernandez, E.B., Mehlau, J., Pernul, G.: A pattern system for access control. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVIII, pp. 235\u2013249. Springer (2004)","DOI":"10.1007\/1-4020-8128-6_16"},{"key":"35_CR29","unstructured":"Uzunov, A.V., Fernandez, E.B., Falkner, K.: A software engineering approach to authorization in distributed, collaborative systems using security patterns and security solution frames (submitted for publication)"},{"key":"35_CR30","doi-asserted-by":"crossref","unstructured":"Delessy, N., Fernandez, E.B., Larrondo-Petrie, M.M., Wu, J.: Patterns for Access Control in Distributed Systems. In: Proceedings of the 14th Pattern Languages of Programs Conference (PLoP), Monticello, Illinois, USA (2007)","DOI":"10.1145\/1772070.1772074"},{"key":"35_CR31","doi-asserted-by":"crossref","unstructured":"Wong, W., Verdi, F., Magalhaes, M.: A security plane for publish\/subscribe based content oriented networks. In: Procs. ACM CoNEXT (2008)","DOI":"10.1145\/1544012.1544057"},{"key":"35_CR32","doi-asserted-by":"crossref","unstructured":"Ssekibuule, R.: Secure Publish-Subscribe Mediated Virtual Organizations. In: Procs. ISSA (2010), http:\/\/icsa.cs.up.ac.za\/issa\/2010\/Proceedings\/Full\/18_Paper.pdf","DOI":"10.1109\/ISSA.2010.5588301"},{"key":"35_CR33","doi-asserted-by":"crossref","unstructured":"Srivatsa, J., Liu, L.: Securing publish-subscribe overlay services with Event Guard. In: Procs. 12th ACM Conference on Computer and Communications Security (CCS), pp. 289\u2013298. ACM (2005)","DOI":"10.1145\/1102120.1102158"},{"key":"35_CR34","first-page":"57","volume":"2","author":"L.I.W. Pesonen","year":"2007","unstructured":"Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access Control in Decentralised Publish\/Subscribe Systems. J. Netw.\u00a02, 57\u201367 (2007)","journal-title":"J. Netw."},{"key":"35_CR35","unstructured":"Osmani, A.: Patterns For Large-Scale JavaScript Application Architecture, http:\/\/addyosmani.com\/largescalejavascript\/"},{"key":"35_CR36","unstructured":"OWASP, Security Analysis of Core J2EE Design Patterns Project\/BusinessTier, https:\/\/www.owasp.org\/index.php\/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project\/BusinessTier"},{"key":"35_CR37","unstructured":"Peltz, C.: Applying Design Issues and Patterns in Web Services, http:\/\/www.devx.com\/enterprise\/Article\/10397\/1954"},{"key":"35_CR38","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Mujica, S., Valenzuela, F.: Two security patterns: Least Privilege and Secure Logger\/Auditor. In: Procs. AsianPLoP (2011)","DOI":"10.1145\/2524629.2524638"},{"key":"35_CR39","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1016\/j.jss.2010.04.067","volume":"83","author":"N.B. Harrison","year":"2010","unstructured":"Harrison, N.B., Avgeriou, P.: How do architecture patterns and tactics interact? A model and annotation. J. Syst. Softw.\u00a083, 1735\u20131758 (2010)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T20:05:56Z","timestamp":1576181156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}