共 15 条
- [1] [Anonymous], P 4 INT WORKSH SOFT
- [2] Applying Security Patterns for Component Based Applications Using UML Profile [J]. 15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 186 - 193
- [3] Secure Component Based Applications Through Security Patterns [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 749 - 754
- [4] Cinneide M. O, 2002, P 4 INT WORKSH PRINC, P162
- [5] Devanbu P. T., 2000, P C FUT SOFTW ENG
- [6] El Boussaidi G, 2007, P INT COMP SOFTW APP, P97
- [7] Fernandez EB, 2007, INTEGRATING SECURITY AND SOFTWARE ENGINEERING: ADVANCES AND FUTURE VISIONS, P107
- [8] Using aspects to design a secure system [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2002, : 117 - 126
- [9] Kajsa P, 2010, LECT NOTES COMPUT SC, V5901, P540
- [10] Ortiz R, 2010, LECT NOTES COMPUT SC, V6426, P672