{"id":"https://openalex.org/W2035304194","doi":"https://doi.org/10.1145/2721956.2721990","title":"On the description of software security patterns","display_name":"On the description of software security patterns","publication_year":2014,"publication_date":"2014-07-09","ids":{"openalex":"https://openalex.org/W2035304194","doi":"https://doi.org/10.1145/2721956.2721990","mag":"2035304194"},"language":"en","primary_location":{"id":"doi:10.1145/2721956.2721990","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2721956.2721990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th European Conference on Pattern Languages of Programs","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008320248","display_name":"Michaela Bunke","orcid":"https://orcid.org/0000-0001-8641-9053"},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"education","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Michaela Bunke","raw_affiliation_strings":["Universit\u00e4t Bremen, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t Bremen, Germany","institution_ids":["https://openalex.org/I180437899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5008320248"],"corresponding_institution_ids":["https://openalex.org/I180437899"],"apc_list":null,"apc_paid":null,"fwci":0.2911,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.55280366,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7212594747543335},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5186364054679871},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4793584942817688},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3911151885986328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3634655177593231},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.29824280738830566},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2067582607269287},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.12620988488197327}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7212594747543335},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5186364054679871},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4793584942817688},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3911151885986328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3634655177593231},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29824280738830566},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2067582607269287},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.12620988488197327}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2721956.2721990","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2721956.2721990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th European Conference on Pattern Languages of Programs","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W79503960","https://openalex.org/W170303387","https://openalex.org/W617329964","https://openalex.org/W652748195","https://openalex.org/W1498306255","https://openalex.org/W1514888816","https://openalex.org/W1535654799","https://openalex.org/W1543417253","https://openalex.org/W1649645444","https://openalex.org/W1968983388","https://openalex.org/W1977471561","https://openalex.org/W1982698707","https://openalex.org/W2033820724","https://openalex.org/W2037801123","https://openalex.org/W2061051425","https://openalex.org/W2079079970","https://openalex.org/W2096791047","https://openalex.org/W2134521102","https://openalex.org/W2144329813","https://openalex.org/W2147128695","https://openalex.org/W2160045272","https://openalex.org/W2336630576","https://openalex.org/W2476304629","https://openalex.org/W2524476898","https://openalex.org/W2589180140","https://openalex.org/W2619284436","https://openalex.org/W4243633667","https://openalex.org/W4253646952","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Security":[0],"patterns":[1,39,115,124,149],"describe":[2],"best":[3],"practices":[4],"to":[5,100,126,135,150,164],"handle":[6],"recurring":[7],"security":[8,38,55],"problems.":[9],"Patterns":[10],"are":[11,45,106],"presented":[12],"with":[13,91],"a":[14,51,82],"special":[15],"description":[16,25,43,84,89,156],"form":[17,26,85],"that":[18,69,94,167],"depicts":[19],"the":[20,62,75,120,127,151,154,161],"pattern's":[21],"specific":[22],"properties.":[23,171],"A":[24],"consists":[27],"of":[28,113,122,147,153],"different":[29],"sections":[30,93,121,146,152,163,166],"such":[31],"as":[32],"Motivation,":[33],"Problem":[34],"or":[35],"Solution.":[36],"Many":[37],"exist":[40],"and":[41,59,65,86,130],"their":[42,57,72],"forms":[44,90],"very":[46],"different.":[47],"This":[48],"heterogeneity":[49],"is":[50],"problem":[52],"for":[53],"comparing":[54],"patterns,":[56],"comprehension":[58],"application":[60],"in":[61,67,74,116],"software":[63,76],"design,":[64],"usage":[66],"tools":[68],"should":[70],"support":[71],"selection":[73],"development":[77],"process.":[78],"Some":[79],"researchers":[80],"desire":[81],"unique":[83],"others":[87],"suggest":[88],"new":[92],"capture":[95,169],"security-specific":[96,104,170],"aspects.":[97],"In":[98],"order":[99],"assess":[101,110],"whether":[102],"additional":[103,162],"facets":[105],"actually":[107],"needed,":[108],"we":[109,141,159],"existing":[111],"descriptions":[112],"software-security":[114,123,148],"depth.":[117],"We":[118],"compare":[119],"publications":[125],"common":[128],"GoF":[129],"POSA":[131],"design":[132],"pattern":[133],"templates":[134],"identify":[136,165],"additionally":[137,144],"used":[138,145],"sections.":[139],"Moreover,":[140],"align":[142],"these":[143],"aforementioned":[155],"forms.":[157],"Finally,":[158],"scan":[160],"possibly":[168]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
