{"id":"https://openalex.org/W2885274739","doi":"https://doi.org/10.1145/3230833.3232821","title":"Evaluating the degree of security of a system built using security patterns","display_name":"Evaluating the degree of security of a system built using security patterns","publication_year":2018,"publication_date":"2018-08-13","ids":{"openalex":"https://openalex.org/W2885274739","doi":"https://doi.org/10.1145/3230833.3232821","mag":"2885274739"},"language":"en","primary_location":{"id":"doi:10.1145/3230833.3232821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3232821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078871025","display_name":"Eduardo B. Fern\u00e1ndez","orcid":"https://orcid.org/0000-0002-5109-4591"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eduardo B. Fernandez","raw_affiliation_strings":["Dept. of CS and EE, Florida Atlantic University, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of CS and EE, Florida Atlantic University, USA","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018128809","display_name":"Nobukazu Yoshioka","orcid":"https://orcid.org/0000-0002-1986-5675"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nobukazu Yoshioka","raw_affiliation_strings":["GRACE Center, Nat. Inst. of Informatics, Japan"],"affiliations":[{"raw_affiliation_string":"GRACE Center, Nat. Inst. of Informatics, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033111691","display_name":"Hironori Washizaki","orcid":"https://orcid.org/0000-0002-1417-9879"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hironori Washizaki","raw_affiliation_strings":["Dept. of CS and Eng., Waseda University, Japan"],"affiliations":[{"raw_affiliation_string":"Dept. of CS and Eng., Waseda University, Japan","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078871025"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":1.1781,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85114261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7647510766983032},{"id":"https://openalex.org/keywords/degree","display_name":"Degree (music)","score":0.5969793200492859},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.5571684241294861},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5348547697067261},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5313582420349121},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5107443332672119},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5047858953475952},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4964028000831604},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4636780917644501},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4214634597301483},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.41012537479400635},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3535851240158081},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.34914928674697876},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.26550576090812683},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.25990819931030273},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2460610270500183},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11781743168830872},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0947766900062561},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08415263891220093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7647510766983032},{"id":"https://openalex.org/C2775997480","wikidata":"https://www.wikidata.org/wiki/Q586277","display_name":"Degree (music)","level":2,"score":0.5969793200492859},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.5571684241294861},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5348547697067261},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5313582420349121},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5107443332672119},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5047858953475952},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4964028000831604},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4636780917644501},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4214634597301483},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.41012537479400635},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3535851240158081},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.34914928674697876},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.26550576090812683},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25990819931030273},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2460610270500183},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11781743168830872},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0947766900062561},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08415263891220093},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3230833.3232821","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230833.3232821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320327550","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W316845903","https://openalex.org/W594115025","https://openalex.org/W617329964","https://openalex.org/W1498306255","https://openalex.org/W1523453234","https://openalex.org/W1535654799","https://openalex.org/W1545543793","https://openalex.org/W1985948672","https://openalex.org/W1996655273","https://openalex.org/W1998017916","https://openalex.org/W1999879211","https://openalex.org/W2006056208","https://openalex.org/W2011176357","https://openalex.org/W2022140071","https://openalex.org/W2025932641","https://openalex.org/W2034448154","https://openalex.org/W2056134008","https://openalex.org/W2065076704","https://openalex.org/W2070226202","https://openalex.org/W2085775116","https://openalex.org/W2087323886","https://openalex.org/W2093087594","https://openalex.org/W2095881341","https://openalex.org/W2098019984","https://openalex.org/W2113682708","https://openalex.org/W2113739228","https://openalex.org/W2129586531","https://openalex.org/W2130080305","https://openalex.org/W2130717725","https://openalex.org/W2146949683","https://openalex.org/W2158145963","https://openalex.org/W2289651665","https://openalex.org/W2295299152","https://openalex.org/W2314911809","https://openalex.org/W2342991766","https://openalex.org/W2404725160","https://openalex.org/W2502940379","https://openalex.org/W2544993249","https://openalex.org/W2614505876","https://openalex.org/W3003288124","https://openalex.org/W4205736829","https://openalex.org/W4285719527","https://openalex.org/W6629888259","https://openalex.org/W6679404241"],"related_works":["https://openalex.org/W2120086576","https://openalex.org/W2086178534","https://openalex.org/W2165898552","https://openalex.org/W2008985775","https://openalex.org/W2745157681","https://openalex.org/W2907868081","https://openalex.org/W2187486724","https://openalex.org/W2056275442","https://openalex.org/W2113932201","https://openalex.org/W1976635772"],"abstract_inverted_index":{"A":[0],"variety":[1],"of":[2,13,25,27,42,49,81,110,122,133],"methodologies":[3],"to":[4,21,37,119,127,129],"build":[5],"secure":[6,142],"systems":[7,82,143],"have":[8,33,84,102,139],"been":[9,56,85],"proposed.":[10],"However,":[11,51],"most":[12],"them":[14],"do":[15],"not":[16],"say":[17],"much":[18],"about":[19],"how":[20,118],"evaluate":[22],"the":[23,40,53,79,97,100,104,108,114,123],"degree":[24,48],"security":[26,80,88,148],"their":[28],"products.":[29],"In":[30,135],"fact,":[31],"we":[32,66,94,138,151],"no":[34],"generally-accepted":[35],"ways":[36],"measure":[38,132],"if":[39,52,96],"product":[41,101],"some":[43,47],"methodology":[44,60,145],"has":[45,55],"reached":[46],"security.":[50,134],"system":[54],"built":[57,86],"with":[58],"a":[59,69,76,130,141],"that":[61,68,83,146],"uses":[62,147],"patterns":[63,98,149],"as":[64,154],"artifacts,":[65],"believe":[67],"simple":[70],"evaluation":[71],"is":[72],"possible.":[73],"We":[74,90,116],"propose":[75],"metric":[77],"for":[78],"using":[87],"patterns:":[89],"perform":[91],"threat":[92],"enumeration,":[93],"check":[95],"in":[99],"stopped":[103],"threats,":[105],"and":[106,150],"calculate":[107],"coverage":[109],"these":[111],"threats":[112],"by":[113],"patterns.":[115],"indicate":[117],"take":[120],"advantage":[121],"Twin":[124],"Peaks":[125],"approach":[126],"arrive":[128],"refined":[131],"early":[136],"work,":[137],"proposed":[140],"development":[144],"use":[152],"it":[153],"example.":[155]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
