{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:10Z","timestamp":1750221250331,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232821","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating the degree of security of a system built using security patterns"],"prefix":"10.1145","author":[{"given":"Eduardo B.","family":"Fernandez","sequence":"first","affiliation":[{"name":"Dept. of CS and EE, Florida Atlantic University, USA"}]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"GRACE Center, Nat. Inst. of Informatics, Japan"}]},{"given":"Hironori","family":"Washizaki","sequence":"additional","affiliation":[{"name":"Dept. of CS and Eng., Waseda University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Describing, instantiating and evaluating a reference architecture: A case study","author":"Avgeriou P.","year":"2003","unstructured":"P. Avgeriou , \" Describing, instantiating and evaluating a reference architecture: A case study \", Enterprise Architecture Journal , June 2003 . P. Avgeriou, \"Describing, instantiating and evaluating a reference architecture: A case study\", Enterprise Architecture Journal, June 2003.","journal-title":"Enterprise Architecture Journal"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2392670"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2008.101"},{"key":"e_1_3_2_1_4_1","volume-title":"Pattern-Oriented Software Architecture: A System of Patterns","author":"Buschmann F.","year":"1996","unstructured":"F. Buschmann , R. Meunier , H. Rohnert , P. Sommerlad , M. Stal . Pattern-Oriented Software Architecture: A System of Patterns , Volume 1 . J. Wiley , 1996 . F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, M. Stal. Pattern-Oriented Software Architecture: A System of Patterns, Volume 1. J. Wiley, 1996."},{"key":"e_1_3_2_1_5_1","volume-title":"last accessed","author":"Portal Common Criteria","year":"2015","unstructured":"Common Criteria Portal , last accessed February 22, 2015 . https:\/\/www.commoneriteriaportal.org\/ Common Criteria Portal, last accessed February 22, 2015. https:\/\/www.commoneriteriaportal.org\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Common Vulnerabilities and Exposures https:\/\/cve.mitre.org\/  Common Vulnerabilities and Exposures https:\/\/cve.mitre.org\/"},{"key":"e_1_3_2_1_7_1","first-page":"07","volume-title":"Integrating security and software engineering: Advances and future visio\"","author":"Fernandez E.B.","year":"2006","unstructured":"E.B. Fernandez , M.M. Larrondo-Petrie , T. Sorgente , and M. VanHilst , \" A methodology to develop secure systems using patterns\" , Chapter 5 in Integrating security and software engineering: Advances and future visio\" , H. Mouratidis and P. Giorgini, Eds., IDEA Press , 2006 , 1pp. 07 -- 126 . E.B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst, \"A methodology to develop secure systems using patterns\", Chapter 5 in Integrating security and software engineering: Advances and future visio\", H. Mouratidis and P. Giorgini, Eds., IDEA Press, 2006, 1pp. 07--126."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.139"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BioMedCom.2012.27"},{"key":"e_1_3_2_1_10_1","series-title":"Wiley Series on Software Design Patterns","volume-title":"Building secure architectures using software patterns","author":"Fernandez E.B.","year":"2013","unstructured":"E.B. Fernandez , \" Security patterns in practice : Building secure architectures using software patterns \". Wiley Series on Software Design Patterns . 2013 E.B.Fernandez, \"Security patterns in practice: Building secure architectures using software patterns\". Wiley Series on Software Design Patterns. 2013"},{"key":"e_1_3_2_1_11_1","volume-title":"Procs. of the WER 2014 conference, a track of the 17th Ibero-American Conf. on Soft. Eng.(CIbSE 2014","author":"Fernandez E.B.","year":"2014","unstructured":"E.B. Fernandez , N. Yoshioka , H. Washizaki , and J. Yoder , \" Abstract security patterns for requirements specification and analysis of secure systems \", Procs. of the WER 2014 conference, a track of the 17th Ibero-American Conf. on Soft. Eng.(CIbSE 2014 ), Pucon, Chile , April 2014 E.B.Fernandez, N. Yoshioka, H. Washizaki, and J. Yoder, \"Abstract security patterns for requirements specification and analysis of secure systems\", Procs. of the WER 2014 conference, a track of the 17th Ibero-American Conf. on Soft. Eng.(CIbSE 2014), Pucon, Chile, April 2014"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-014-0218-7"},{"volume-title":"Proc. of REFSQ'15","author":"de Gramatica M.","key":"e_1_3_2_1_13_1","unstructured":"M. de Gramatica , K. Labunets , F. Massacci , F. Paci , and A. Tedeschi . The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals . In Proc. of REFSQ'15 M. de Gramatica, K. Labunets, F. Massacci, F. Paci, and A. Tedeschi. The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals. In Proc. of REFSQ'15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.61"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/info7020023"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.54"},{"key":"e_1_3_2_1_17_1","first-page":"6542","article-title":"The Security Twin Peaks","volume":"2011","author":"Heyman T","year":"2011","unstructured":"T Heyman , K. Yskout , R Scandariato , H. Schmidt , Y. Yu , \" The Security Twin Peaks \", ESSoS 2011 , LNCS 6542 , 167--180, 2011 . T Heyman, K. Yskout, R Scandariato, H. Schmidt, Y. Yu, \"The Security Twin Peaks\", ESSoS 2011, LNCS 6542, 167--180, 2011.","journal-title":"ESSoS"},{"key":"e_1_3_2_1_18_1","volume-title":"Indrakshi Ray","author":"Houmb Siv Hilde","year":"2010","unstructured":"Siv Hilde Houmb , Sudip Chakraborty , Indrakshi Ray , Indrajit Ray : Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010 : 241--256 Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray: Using Trust-Based Information Aggregation for Predicting Security Level of Systems. DBSec 2010: 241--256"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7564"},{"key":"e_1_3_2_1_20_1","volume-title":"Secure systems development with UML","author":"Jurjens J.","year":"2004","unstructured":"J. Jurjens , Secure systems development with UML , Springer-Verlag , 2004 . J. Jurjens, Secure systems development with UML, Springer-Verlag, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062519"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699840.2699848"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1842752.1842797"},{"key":"e_1_3_2_1_25_1","unstructured":"NIST National Vulnerability Database https:\/\/nvd.nist.gov\/vuln-metrics  NIST National Vulnerability Database https:\/\/nvd.nist.gov\/vuln-metrics"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.910904"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2012.72"},{"key":"e_1_3_2_1_28_1","unstructured":"OWASP \"The Ten Most Critical Web Application Security Risks.\" 2013 https:\/\/www.owasp.org\/index.php\/Top_10_2013  OWASP \"The Ten Most Critical Web Application Security Risks.\" 2013 https:\/\/www.owasp.org\/index.php\/Top_10_2013"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the 21st Int. Requirements Eng. Conf.","author":"Pasquale L.","year":"2013","unstructured":"L. Pasquale , Y. Yu , M. Salehie , L. Cavallaro , T.T. Tun , B. Nuseibeh , \"Requirements-driven adaptive digital forensics \", Proc. of the 21st Int. Requirements Eng. Conf. , 2013 , 340--341. L. Pasquale, Y. Yu, M. Salehie, L. Cavallaro, T.T. Tun, B. Nuseibeh, \"Requirements-driven adaptive digital forensics\", Proc. of the 21st Int. Requirements Eng. Conf., 2013, 340--341."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.105"},{"key":"e_1_3_2_1_31_1","volume-title":"In2ormation and Software Technology 58","author":"Rebollo O","year":"2015","unstructured":"O Rebollo , D Mellado , E Fern\u00e1ndez-Medina , H Mouratidis , Empirical evaluation of a cloud computing information security governance framework , In2ormation and Software Technology 58 , 2015 , 44--57 O Rebollo, D Mellado, E Fern\u00e1ndez-Medina, H Mouratidis, Empirical evaluation of a cloud computing information security governance framework, In2ormation and Software Technology 58, 2015, 44--57"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593868.2593880"},{"key":"e_1_3_2_1_33_1","volume-title":"working with stakeholders using viewpoints and perspectives","author":"Rozanski N.","year":"2012","unstructured":"N. Rozanski , E. Woods , \" Software systems architecture : working with stakeholders using viewpoints and perspectives \". Addison-Wesley Educational Publishers ., 2 nd Ed. ( 2012 ) N. Rozanski, E. Woods, \"Software systems architecture: working with stakeholders using viewpoints and perspectives\". Addison-Wesley Educational Publishers., 2nd Ed. (2012)","edition":"2"},{"key":"e_1_3_2_1_34_1","volume-title":"The Unified Modeling Language Reference Manual","author":"Rumbaugh J.","year":"1999","unstructured":"J. Rumbaugh , I. Jacobson , and G. Booch , The Unified Modeling Language Reference Manual , Addison-Wesley, Boston , Mass ., 1999 . J. Rumbaugh, I. Jacobson, and G. Booch, The Unified Modeling Language Reference Manual, Addison-Wesley, Boston, Mass., 1999."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.002"},{"key":"e_1_3_2_1_37_1","unstructured":"CMU SEI http:\/\/resources.sei.cmu.edu\/asset_files\/Presentation\/2011_017_001_52415.pdf  CMU SEI http:\/\/resources.sei.cmu.edu\/asset_files\/Presentation\/2011_017_001_52415.pdf"},{"key":"e_1_3_2_1_38_1","volume-title":"Procs. Pattern Languages of Programming Conference","author":"Schumacher M.","year":"2001","unstructured":"M. Schumacher and U. Roedig , \" Security engineering with patterns \", Procs. Pattern Languages of Programming Conference , 2001 M. Schumacher and U. Roedig, \"Security engineering with patterns\", Procs. Pattern Languages of Programming Conference, 2001"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(94)90038-8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.56"},{"key":"e_1_3_2_1_41_1","volume-title":"Software architecture: Foundation, theory, and practice","author":"Taylor R.N.","year":"2010","unstructured":"R.N. Taylor , N. Medvidovic , and N. Dashofy . Software architecture: Foundation, theory, and practice , Wiley , 2010 . R.N. Taylor, N. Medvidovic, and N. Dashofy. Software architecture: Foundation, theory, and practice, Wiley, 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.005"},{"issue":"20","key":"e_1_3_2_1_43_1","first-page":"2920","article-title":"Engineering Security into Distributed Systems: A Survey of Methodologies","volume":"18","author":"Uzunov A. V.","year":"2013","unstructured":"A. V. Uzunov , E.B. Fernandez , and K. Falkner , \" Engineering Security into Distributed Systems: A Survey of Methodologies \", Journal of Universal Computer Science , Vol. 18 , No. 20 , 2013 , pp. 2920 -- 3006 http:\/\/www.jucs.org\/jucs_18_20\/engineering_security_into_distributed A. V. Uzunov, E.B.Fernandez, and K. Falkner, \"Engineering Security into Distributed Systems: A Survey of Methodologies\", Journal of Universal Computer Science, Vol. 18, No. 20, 2013, pp. 2920--3006 http:\/\/www.jucs.org\/jucs_18_20\/engineering_security_into_distributed","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.12.008"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2015.02.011"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":45,"alternative-id":["10.1145\/3230833.3232821","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232821","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}