Unified Process[Unified Process] Enterprise Unified Process: http://www.enterpriseunifiedprocess.info Security Principles[NIST] NIST Security principles: http://csrc.nist.gov/publications/nistpubs/ [Sun Blueprints] Trust Modeling for Security Architecture Development http://www.sun.com/blueprints/1202/817-0775.pdf Security Patterns[Amos] Alfred Amos . "Designing Security into Software with Patterns." April 26, 2003. http://www.giac.org/practical/GSEC/Alfred_Amos_GSEC.pdf [Berry] Craig A. Berry, John Carnell, Matjaz B. Juric, Meeraj Moidoo Kunnumpurath, Nadia Nashi, and Sasha Romanosky. J2EE Design Patterns Applied. Wrox Press, 2002. [CJP] Deepak Alur, John Crupi, Dan Malks. Core J2EE Patterns: Best Practices and Design Strategies. Prentice Hall, 2003. [IBM] IBM. "Introduction to Business Security Patterns: An IBM White Paper." IBM, 2003. http://www-3.ibm.com/security/patterns/intro.pdf [Monzillo] Ron Monzillo and Mark Roth. "Securing Applications for the Java 2 Platform, Enterprise Edition (J2EE)." Java One 2001 Conference. [OpenGroup] The Open Group. "Guide to Security Patterns." Draft 1. The Open Group, April 5, 2002. [Romanosky2001] Sasha Romanosky. "Security Design Patterns, Part 1" Version 1.4. November 12, 2001. [Romanosky2002] Sasha Romanosky. "Enterprise Security Patterns." June 4, 2002. http://www.romanosky.net/papers/securitypatterns/EnterpriseSecurityPatterns.pdf [WassermannBetty] Ronald Wassermann and Betty H. C. Cheng. "Security Patterns." Michigan State University (MSU-CSE-03-23). August 2003. http://www.cse.msu.edu/cgi-user/Web/tech/document?ID=547 [YoderBarcalow1997] Joseph Yoder and Jeffrey Barcalow. "Architectural Patterns for Enabling Application Security." Pattern Languages of Programs Conference, 1997. http://www.joeyoder.com/papers/patterns/Security/appsec.pdf Others[XACML2] OASIS. Extensible Access Control Markup LanguageVersion 2, Committee draft 04, December 6, 2004. http://docs.oasis-open.org/xacml/access_control-xacml-2.0-core-spec-cd-04.pdf [LIBERTY1] Liberty Alliance. Liberty Trust Models Guidelines, Version 1.0 http://www.projectliberty.org/specs/liberty-trust-models-guidelines-v1.0.pdf [Fowler1] Martin Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, 2000. [Kerievsky1] Joshua Kerievsky. Refactoring to Patterns. Addison-Wesley, 2005. [Gof] Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994. |