References


Unified Process

[Unified Process] Enterprise Unified Process: http://www.enterpriseunifiedprocess.info

Security Principles

[NIST] NIST Security principles: http://csrc.nist.gov/publications/nistpubs/

[Sun Blueprints] Trust Modeling for Security Architecture Development http://www.sun.com/blueprints/1202/817-0775.pdf

Security Patterns

[Amos] Alfred Amos . "Designing Security into Software with Patterns." April 26, 2003. http://www.giac.org/practical/GSEC/Alfred_Amos_GSEC.pdf

[Berry] Craig A. Berry, John Carnell, Matjaz B. Juric, Meeraj Moidoo Kunnumpurath, Nadia Nashi, and Sasha Romanosky. J2EE Design Patterns Applied. Wrox Press, 2002.

[CJP] Deepak Alur, John Crupi, Dan Malks. Core J2EE Patterns: Best Practices and Design Strategies. Prentice Hall, 2003.

[IBM] IBM. "Introduction to Business Security Patterns: An IBM White Paper." IBM, 2003. http://www-3.ibm.com/security/patterns/intro.pdf

[Monzillo] Ron Monzillo and Mark Roth. "Securing Applications for the Java 2 Platform, Enterprise Edition (J2EE)." Java One 2001 Conference.

[OpenGroup] The Open Group. "Guide to Security Patterns." Draft 1. The Open Group, April 5, 2002.

[Romanosky2001] Sasha Romanosky. "Security Design Patterns, Part 1" Version 1.4. November 12, 2001.

[Romanosky2002] Sasha Romanosky. "Enterprise Security Patterns." June 4, 2002. http://www.romanosky.net/papers/securitypatterns/EnterpriseSecurityPatterns.pdf

[WassermannBetty] Ronald Wassermann and Betty H. C. Cheng. "Security Patterns." Michigan State University (MSU-CSE-03-23). August 2003. http://www.cse.msu.edu/cgi-user/Web/tech/document?ID=547

[YoderBarcalow1997] Joseph Yoder and Jeffrey Barcalow. "Architectural Patterns for Enabling Application Security." Pattern Languages of Programs Conference, 1997. http://www.joeyoder.com/papers/patterns/Security/appsec.pdf

Others

[XACML2] OASIS. Extensible Access Control Markup LanguageVersion 2, Committee draft 04, December 6, 2004. http://docs.oasis-open.org/xacml/access_control-xacml-2.0-core-spec-cd-04.pdf

[LIBERTY1] Liberty Alliance. Liberty Trust Models Guidelines, Version 1.0 http://www.projectliberty.org/specs/liberty-trust-models-guidelines-v1.0.pdf

[Fowler1] Martin Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, 2000.

[Kerievsky1] Joshua Kerievsky. Refactoring to Patterns. Addison-Wesley, 2005.

[Gof] Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994.




Core Security Patterns. Best Practices and Strategies for J2EE, Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
ISBN: 0131463071
EAN: 2147483647
Year: 2005
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net