Citations of paper titled

"Architectural Risk Analysis of Software Systems based on Security Patterns"

  1. M. James Tanner, "Security by Design," Master's Thesis, University of Advancing Technology, August 2009.
  2. M. Upendra Kumar, D. Sravan Kumar, and D. Shravani, "Designing Dependable Agile Layered Security Architecture Solutions – Web 2.0 Services Case Study," International Journal of Recent Trends in Engineering, vol. 2, no. 4, pp. 31-33, November 2009.
  3. D. Sravan Kumar, and M. Upendra Kumar, "Designing Dependable Service Oriented Web Services Security Architectures Solutions," International Journal of Engineering and Technology, vol. 2, no. 2, pp. 81-86, 2010.
  4. M. Upendra Kumar, D. Sravan Kumar, K. Venkateswara Rao, A. Madhuri, A.V. Krishna Prasad, and D. Shravani, "Agile Modeling for Security Requirements – Embedded Application Case Study," International Journal of Engineering Science and Technology, vol. 2, no. 6, pp. 2014-2019, 2010.
  5. Ajay Kakkar, M. L. Singh, and P. K. Bansal, "Efficient Key Mechanisms in Multi-Node Network for Secured Data Transmission," International Journal of Engineering Science and Technology, vol. 2 no. 5, pp. 787-795, 2010.
  6. Siani Pearson, and Yun Shen, "Context-Aware Privacy Design Pattern Selection," HP Laboratories, Technical Report HPL-2010-74, July 2010. (Published and presented at TrustBus 2010, Spain, May 16, 2010)
  7. Abdulaziz Alkussayer, and William H. Allen, "A Scenario-Based Framework for the Security Evaluation of Software Architecture," pp. 687-695, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT'10), Chengdu, China, July 9-11, 2010.
  8. A.V. Krishna Prasad, S. Ramakrishna, and D. Shravani, "Security Patterns for Web Services Mining Agile Architectures," International Journal of Computer Science and Information Technologies, vol. 1, no. 3, pp. 185-189, 2010.
  9. M. Upendra Kumar, D. Sravan Kumar, P. Hari Krishna, M.V.R. Jyothi Sree, and A. Madhuri, "Security Patterns for Agile Layered Security Architectures," International Journal of Recent Trends in Engineering, vol. 3, no. 2, pp. 136-140, May 2010.
  10. Roberto Ortiz, Santiago Moral-García, Santiago Moral-Rubio, Belén Vela, Javier Garzás, and Eduardo Fernández-Medina, "Applicability of Security Patterns," On the Move to Meaningful Internet Systems: OTM 2010, Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010. (Proceedings: Lecture Notes in Computer Science, vol. 6426, pp. 672-684, 2010)
  11. K. Venkateswar Rao, M. Srinivasa Rao, K. Mrunalini Devi, D. Sravan Kumar, and M. Upendra Kumar, "Web Services Security Architectures using Role-Based Access Control," International Journal of Computer Science and Information Technologies, vol. 1, no. 5, pp. 402-407, 2010.
  12. D. Shravani, P. Suresh Varma, B. Padmaja Rani, D. Sravan Kumar, and M. Upendra Kumar, "Web Services Security Architectures Composition and Contract Design using RBAC," International Journal on Computer Science and Engineering, vol. 2, no. 8, pp. 2609-2615, 2010.
  13. A. V. Krishna Prasad, S. Ramakrishna, B. Padmaja Rani, D. Sravan Kumar, and M. Upendra Kumar, "Software Architectures Design Patterns Mining for Security Engineering," International Journal of Computer Science and Information Technologies, vol. 1, no. 5, pp. 408-413, 2010.
  14. Sona Rani, Indu Batra, and Manu Bansal, "Secure Data Processing Using S-Boxes and Multiple Keys in Multinode Network," SGI Reflections - International Journal of Science, Technology & Management, vol. 1, no. 1, pp. 83-88, April 2010.
  15. Sumitra Sangwan, and Yashwant Singh Sangwan, "Designing a Frame Work for Web Application Information Security Architecture," International Journal of Electronics Engineering, vol. 2, no. 2, pp. 377-380, 2010.
  16. M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, and C. Rama Linga Reddy, "Layered Security Architectures Requirements using MDA and Agile Modeling," International Journal of Engineering and Technoscience, vol. 1, no. 1, pp. 82-88, 2010.
  17. M. Upendra Kumar, B. Padmaja Rani, D. Sravan Kumar, P. Suresh Varma, and D. Shravani, "Layered Security Architectures Requirements using Model Driven Architecture Agile Modeling," International Journal of Computer Information Systems, vol. 1, no. 5, 2010.
  18. Ajay Kakkar, M. L. Singh, and P. K. Bansal, "Secure Data Processing in MNN using S-Boxes and Multiple Keys," TECHNIA – International Journal of Computing Science and Communication Technologies, vol. 2, no. 1, July 2009.
  19. Ajay Kakkar, "Encryption Technique for Reliable Data Transmission in Multinode Network," International Journal of Research in IT & Management, vol. 1, no. 2, pp. 23-30, June 2011.
  20. M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, K. Venkateswar Rao, and A. V. Krishna Prasad, "Dependable Privacy Requirements by Agile Modeled Layered Security Architectures – Web Services Case Study," First International Conference On Computer Science, Engineering And Applications (CCSEA'11), Chennai, India, July 15-17, 2011.
  21. Ping Sun, "Optimal Selection of Composite Web Service based on QoS and Risk Evaluation," International Conference on E-Business and E-Government (ICEE'11), Shanghai, China, May 6-8, 2011.
  22. D. Shravani, P. Suresh Varma, B. Padmaja Rani, K. Venkateswar Rao, and M. Upendra Kumar, "Web Services Security Architectures for Secure Service Oriented Analysis and Design," International Journal of Computer Trends and Technology, vol. 1, no. 1, pp. 174-178, March-April 2011.
  23. Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, and Eduardo Fernandez-Medina, "A Systematic Security Analysis of Information Systems," Third International Conferences on Pervasive Patterns and Applications (PATTERNS'11), Rome, Italy, September 25-30, 2011.
  24. Ajay Kakkar, "Key Features for Reliable Data Transmission by using 3 Generation," International Journal of Science, Technology & Management, vol. 2, no. 2, pp. 21-24, December 2010.
  25. Abdulaziz Alkussayer, and William H. Allen, "Security Risk Analysis of Software Architecture Based on AHP," pp. 60-67, 7th International Conference on Networked Computing (INC'11), Gumi, Korea, September 26-28, 2011.
  26. A. V. Krishna Prasad, S. Ramakrishna, P. Suresh Varma, and D. Shravani, "Mining for Secure Web based Business Intelligence Applications," IJCA Proceedings on International Conference on Web Services Computing (ICWSC'11), vol. 1, pp. 60-66, November 2011.
  27. D. Shravani, P. Suresh Varma, K. Venkateswar Rao, B. Padmaja Rani, and M. Upendra Kumar, "Dependable Web Services Security Architecture Development Theoretical and Practical Issues - Spatial Web Services Case Study," Computer Science & Information Technology, vol. 2, no. 1, pp. 79-98, 2012.
  28. D. Shravani, P. Suresh Varma, B. Padmaja Rani, and K. Venkateswar Rao, "Design of Web 2.0 Services Security Architectures," International Journal of Computer Information Systems, vol. 3, no.2, 2011.
  29. Ben Smith, and Laurie Williams, "On the Effective Use of Security Test Patterns," Sixth International Conference on Software Security and Reliability (SERE'12), Washington, DC, USA, June 20-22, 2012.
  30. M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, K. Venkateswar Rao, A.V. Krishna Prasad, and D. Shravani, "Dependable Solutions Design by Agile Modeled Layered Security Architectures," Second International Conference on Computer Science and Information Technology (CCSIT'12), Bangalore, India, January 2-4, 2012. (Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 84, part 3, pp. 510-519, Springer, 2012)
  31. Michaela Bunke, Rainer Koschke, and Karsten Sohr, "Organizing Security Patterns Related to Security and Pattern Recognition Requirements," International Journal on Advances in Security, vol. 5, no. 1 & 2, pp. 46-67, 2012.
  32. Benjamin Hatfield Smith, "Empirically Developing a Security Test Pattern Catalog using a Grounded Theory Approach," Ph.D. dissertation, North Carolina State University, Raleigh, North Carolina, USA, 2012.
  33. Ajay Kakkar, M. L. Singh, and P. K. Bansal, "Mathematical analysis and simulation of multiple keys and S-Boxes in a multinode network for secure transmission," International Journal of Computer Mathematics, 2012. (published online 3 August 2012)
  34. N. Suresh, and D. Manimegalai, "A Novel Approach in Cost Estimation based on Algorithmic Model," International Journal of Computer Trends and Technology, vol. 3, no. 5, pp. 685-693, 2012.
  35. Yong-xin Tang, and Da-tai Yu, "Metrics of Interaction Inherent Security Based on Input Point Complexity," Journal of University of Electronic Science and Technology of China, vol. 41, no. 5, September 2012.
  36. Mohamed Almorsy, John Grundy, and Amani S. Ibrahim, "Automated Software Architecture Security Risk Analysis Using Formalized Signatures," 35th IEEE/ACM International Conference on Software Engineering (ICSE'13), San Francisco, USA, May 21-27, 2013.
  37. Imran Ghani, and Izzaty Yasin, "Software Security Engineering in Extreme Programming Methodology: A Systematic Literature Review," Science International-Lahore, vol. 25, no. 2, pp. 215-221, 2013.
  38. Christopher Preschern, Nermin Kajtazovic, and Christian Kreiner, "Security Analysis of Safety Patterns," 20th Conference on Pattern Languages of Programs (PLoP'13), Monticello, IL, USA, October 23-26, 2013.
  39. Ricardo Julio Rodríguez Fernández, "Performance Analysis and Resource Optimisation of Critical Systems Modelled by Petri Nets," Ph.D. dissertation, Dpto. de Informática e Ingeniería de Sistemas, Universidad de Zaragoza, Spain, June 2013.
  40. Christopher Preschern, Nermin Kajtazovic, Andrea Höller, and Christian Kreiner, "Quantitative Security Estimation Based on Safety Architecture Design Patterns," Lecture Notes on Software Engineering, vol. 2, no. 4, November 2014.
  41. Adila Firdaus Arbain, Imran Ghani, and Seung Ryul Jeong, "A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model," Journal of Internet Computing and Services, vol. 15, no. 1, pp. 13-27, February 2014.
  42. Rahma Bouaziz, Slim Kallel, and Bernard Coulette, "An Approach for Security Patterns Application in Component Based Models," 14th International Conference on Computational Science and Its Applications (ICCSA'14), Guimaraes, Portugal, June 30 - July 3, 2014. (Proceedings: Lecture Notes in Computer Science, vol. 8583, pp. 283-296, Springer, 2014)
  43. Hossain Shahriar, and Hisham Haddad, "Risk Assessment of Code Injection Vulnerabilities Using Fuzzy Logic-Based System," 29th Symposium On Applied Computing (SAC'14), Gyeongju, Korea, March 24-28, 2014.
  44. Rakesh Kumar, "Optimized Key Management System in Cryptographic Algorithms for Data Security," Master’s Thesis, Electronics and Communication Engineering Department, Thapar University, Patiala, India, July 2014.
  45. Hitesh Mittal, "Optimized Encryption Algorithm using Dynamic Keys," Master’s Thesis, Electronics and Communication Engineering Department, Thapar University, Patiala, India, July 2014.
  46. Hui Guan, "Security-Driven Software Evolution Using AModel Driven Approach," Ph.D. Dissertation, Software Technology Research Laboratory, De Montfort University, 2014.
  47. Rahma Bouaziz, Slim Kallel, and Bernard Coulette, "A collaborative process for developing secure component based applications," 23rd IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'14), Parma, Italy, June 23-25, 2014.
  48. Feng Zhao, Hai Jin, Deqing Zou, and Pan Qin, "Dependability analysis for fault-tolerant computer systems using dynamic fault graphs," China Communications, vol. 11, no. 9, pp. 16-30, September 2014.
  49. Guido Salvaneschi, and Paolo Salvaneschi, "Metrics of Software Security," Encyclopedia of Cryptography and Security, pp. 775-778, 2011.
  50. Leanid Krautsevich, "Quantitative Evaluation and Reevaluation of Security in Services," Ph.D. dissertation, Università degli Studi di Pisa, October 20, 2013.
  51. Jaewon Lee, "An Enhanced Risk Formula for Software Security Vulnerabilities," ISACA Journal, vol. 4, pp. 1-7, 2014.
  52. Rahma Bouaziz, Fatma Krichen, and Bernard Coulette, "C-SCRIP: Collaborative Security Pattern Integration Process," International Journal of Information Technology and Web Engineering (IJITWE), vol. 10, no. 1, 2015.
  53. Marko Saarela, "Measuring software security from the design of software," Master’s Thesis, Department of Information Technology, University of Turku, Finland, February 2016.
  54. Anton V. Uzunov, "A survey of security solutions for distributed publish/subscribe systems," Computers & Security, 2016. (Available online 4 May 2016)
  55. Hossain Shahriar, and Hisham Haddad, "Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications," International Journal of Secure Software Engineering, vol. 7, no. 2, pp. 1-18, April-June 2016.
  56. Ajay Kumar, "Optimization of Encryption Algorithm for Secured Communication," Master’s Thesis, Electronics and Communication Engineering Department, Thapar University, Patiala, India, July 2014.
  57. Eduardo B. Fernandez, "Introduction to the Special Issue on Evaluating the Security of Complex Systems," Information, vol. 7, no. 3, July 2016.
  58. Victoria McIntyre, Jungwoo Ryoo, Kyung-Won Park, and Hyoungshick Kim, "Developer-Friendly Software Security," Encyclopedia of Software Engineering, pp. 1-14, 2016. (Published online: 13 April 2016)
  59. Jose Fran. Ruiz, Marcos Arjona, Antonio Maña, Carsten Rudolph, "Security knowledge representation artifacts for creating secure IT systems," Computers & Security, 2016. (Available online 7 September 2016)
  60. M. Guru Vimal Kumar, and U. S. Ragupathy, "A Survey on Current Key Issues and Status in Cryptography," International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET'16), Chennai, India, March 23-25, 2016.
  61. Daniel Vecchiato, Marco Vieira, and Eliane Martins, "Risk Assessment of User-Defined Security Configurations for Android Devices," 27th International Symposium on Software Reliability Engineering (ISSRE'16), Ottawa, ON, Canada, October 23-27, 2016.
  62. Ali Sedaghatbaf, and Mohammad Abdollahi Azgomi, "Quantitative Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence Theory," The ISC International Journal of Information Security, vol. 8, no. 2, pp. 137-149, July 2016.
  63. Mohamed Almorsy, "Adaptive, Model-based Cloud Computing Security Management," Ph.D. dissertation, Swinburne University of Technology, 2014.
  64. Chitra S. Hema, Yogeshwaran R., "VLSI Implementation of RSA Cryptography using Fractional Chebyshev Polynomials," Asian Journal of Research in Social Sciences and Humanities, vol. 7, no. 3, 2017.
  65. Steven Russell Pierce, "Information Technology Certifier Perspectives on Areas Affecting Certification Assessments: A Phenomenological Study," Ph.D. dissertation, University of Phoenix, USA, October 2009.
  66. Abdulaziz Alkussayer, "Towards a Secure Software Development Framework Based on an Integrated Engineering Process," Ph.D. dissertation, Florida Institute of Technology, USA, May 2011.