{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:53:37Z","timestamp":1729677217509,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ares.2006.18","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T16:26:01Z","timestamp":1148574361000},"page":"8 pp.-365","source":"Crossref","is-referenced-by-count":10,"title":["A study of security architectural patterns"],"prefix":"10.1109","author":[{"given":"D.G.","family":"Rosado","sequence":"first","affiliation":[]},{"given":"C.","family":"Gutierrez","sequence":"additional","affiliation":[]},{"given":"E.","family":"Fernandez-Medina","sequence":"additional","affiliation":[]},{"given":"M.","family":"Piattini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"More patterns for operating systems access control","author":"fernandez","year":"2003","journal-title":"Proceedings of the 8th European Conference on Pattern Languages of Programs (EuroPLoP"},{"key":"17","article-title":"A pattern language for security models","author":"fernandez","year":"2001","journal-title":"8th Conference on Pattern Languages of Programs PLoP 2001"},{"key":"18","article-title":"Architectural patterns for enabling application security","author":"yoder","year":"1997","journal-title":"4th Conference on Patterns Language of Programming PLop 1997"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1994","author":"gamma","key":"15"},{"key":"16","article-title":"Patterns for operating systems access control","author":"fernandez","year":"2002","journal-title":"9th Conference on Pattern Languages of Programs PLoP 2002"},{"journal-title":"Using Security Patterns to Model and Analyze Security Requirements","year":"2004","author":"wassermann","key":"13"},{"journal-title":"AG Communication System Template Pattern","year":"1996","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"journal-title":"A Pattern Language Towns Builings Construction","year":"1977","author":"alexander","key":"12"},{"key":"21","article-title":"Two patterns for web services security","author":"fernandez","year":"2004","journal-title":"Proc of the 2004 International Symposium on Web Services and Application"},{"key":"20","article-title":"A pattern language for firewalls","author":"fernandez","year":"2003","journal-title":"10th Conference on Pattern Languages of Programs (PLoP'2003)"},{"key":"22","article-title":"Pattern language for cryptographic key management","author":"lehtoren","year":"2002","journal-title":"7th European Conference on Pattern Languages of Programs (EuroPlop'2002)"},{"journal-title":"Trusted OS Security Principles and Practice","year":"2001","key":"23"},{"journal-title":"Hewlett Packard Corp Virtual Vault","year":"0","key":"24"},{"key":"25","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/PROC.1984.12867","article-title":"a processor family for personal computers","volume":"72","author":"childs","year":"1984","journal-title":"Proceedings of the IEEE"},{"key":"26","first-page":"168","article-title":"AIX operating system: A trustworthy computing system","author":"camillone","year":"1990","journal-title":"IBM RISC System\/6000 Technology"},{"journal-title":"Java Security 2nd Ed","year":"2001","author":"oaks","key":"27"},{"journal-title":"Building Secure Software -how to Avoid Security Problems the Right Way 1st Ed","year":"2002","author":"viega","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/11558569_11"},{"key":"3","first-page":"43","article-title":"Reflections on cyberweapons controls","volume":"16","author":"dennings","year":"2000","journal-title":"Computer Security"},{"key":"2","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/PL00010360","article-title":"Requirements reuse for improving information systems security: A practitioner's approach","volume":"6","author":"toval","year":"2001","journal-title":"Requirements Engineering Journal"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2003.2.1.c6"},{"key":"1","article-title":"An overview of Internet security","author":"fernandez","year":"2001","journal-title":"World's Internet and Electronic Cities Conference (WIECC 2001)"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1147\/sj.371.0106"},{"key":"6","first-page":"227","article-title":"Software engineering for security: A roadmap in: A. Finkelstein","author":"devanbu","year":"2000","journal-title":"The Future of Software Engineering ACM Press"},{"key":"5","article-title":"Secure database systems in: M. Piattini, O. Di?az","author":"ferrari","year":"2000","journal-title":"Advanced Databases Technology Design"},{"key":"31","article-title":"Towards a process for web services security","author":"gutie?rrez","year":"2005","journal-title":"WOSIS'05"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2002.976936"},{"key":"9","article-title":"Metadata and authorization patterns","author":"fernandez","year":"2000","journal-title":"Florida Atlantic University TR-CSE-00-16"},{"journal-title":"Guidance for Boards of Directors and Executive Management","article-title":"Information security governance","year":"2001","key":"8"}],"event":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","start":{"date-parts":[[2006,4,20]]},"location":"Vienna, Austria","end":{"date-parts":[[2006,4,22]]}},"container-title":["First International Conference on Availability, Reliability and Security (ARES'06)"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/10823\/34117\/01625331.pdf?arnumber=1625331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T02:01:43Z","timestamp":1497664903000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/1625331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":31,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/ares.2006.18","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}