Introduction to the Special Issue on Evaluating the Security of Complex Systems
Abstract
:Conflicts of Interest
References
- Breu, R.; Innerhofer-Oberperfler, F.; Yautsiukhin, A. Quantitative assessment of enterprise security system. In Proceedings of the Third International Conference on Availability, Security and Reliability (ARES), Barcelona, Spain, 4–7 March 2008; pp. 921–928.
- Fernandez, E.B.; Yoshioka, N.; Washizaki, H.; VanHilst, M. Measuring the level of security introduced by security patterns. In Proceedings of the 4th Workshop on Secure Systems Methodologies Using Patterns (SPattern 2010), in Conjunction with ARES 2010, Krakow, Poland, 15–18 February 2010.
- Halkidis, S.T.; Tsantalkis, N.; Chatzigeorgiu, A.; Stephanides, G. Architectural risk analysis of software systems based on security patterns. IEEE Trans. Depend. Secure Comput. 2008, 5, 129–142. [Google Scholar] [CrossRef]
- Heyman, T.; Scandariato, R.; Huygens, C.; Joosen, W. Using security patterns to combine security metrics. In Proceedings of the Third International Conference on Availability, Security and Reliability (ARES), Barcelona, Spain, 4–7 March 2008; pp. 1156–1163.
- Fernandez, E.B. Security Patterns in Practice: Building Secure Architectures Using Software Patterns; Wiley: Chichester, UK, 2013. [Google Scholar]
- Heckman, M.R.; Schell, R.R. Using Proven Reference Monitor Patterns for Security Evaluation. Information 2016, 7, 23. [Google Scholar] [CrossRef]
- Fernandez, E.B.; Yoshioka, N.; Washizaki, H.; VanHilst, M. An approach to model-based development of secure and reliable systems. In Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 22–26 August 2011.
- Yoshizawa, M.; Washizaki, H.; Fukazawa, Y.; Okubo, T.; Kaiya, H.; Yoshioka, N. Implementation Support of Security Design Patterns Using Test Templates. Information 2016, 7, 34. [Google Scholar] [CrossRef]
- Zalewski, J.; Buckley, I.A.; Czejdo, B.; Drager, S.; Kornecki, A.J.; Subramanian, N. A Framework for Measuring Security as a System Property in Cyberphysical Systems. Information 2016, 7, 33. [Google Scholar] [CrossRef]
- Beckers, K.; Dürrwang, J.; Holling, D. Standard Compliant Hazard and Threat Analysis for the Automotive Domain. Information 2016, 7, 36. [Google Scholar] [CrossRef]
- Meis, R.; Heisel, M. Computer-Aided Identification and Validation of Privacy Requirements. Information 2016, 7, 28. [Google Scholar] [CrossRef]
- Buschmann, F.; Meunier, R.; Rohnert, H.; Sommerland, P.; Stal, M. Pattern-Oriented Software Architecture Volume 1: A System of Patterns; Wiley: Chichester, UK, 1996. [Google Scholar]
- Wikipedia: Aspect-oriented software development. Available online: https://en.wikipedia.org/wiki/Aspect-oriented_software_development (accessed on 9 July 2016).
- Jackson, M. Problem Frames: Analyzing and Structuring Software Development Problems; Addison-Wesley: Boston, MA, USA, 2001. [Google Scholar]
© 2016 by the author; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fernandez, E.B. Introduction to the Special Issue on Evaluating the Security of Complex Systems. Information 2016, 7, 46. https://doi.org/10.3390/info7030046
Fernandez EB. Introduction to the Special Issue on Evaluating the Security of Complex Systems. Information. 2016; 7(3):46. https://doi.org/10.3390/info7030046
Chicago/Turabian StyleFernandez, Eduardo B. 2016. "Introduction to the Special Issue on Evaluating the Security of Complex Systems" Information 7, no. 3: 46. https://doi.org/10.3390/info7030046
APA StyleFernandez, E. B. (2016). Introduction to the Special Issue on Evaluating the Security of Complex Systems. Information, 7(3), 46. https://doi.org/10.3390/info7030046