{"id":"https://openalex.org/W3198611694","doi":"https://doi.org/10.18293/seke2021-179","title":"From Vulnerability Anti-Patterns to Secure Design Patterns (S)","display_name":"From Vulnerability Anti-Patterns to Secure Design Patterns (S)","publication_year":2021,"publication_date":"2021-07-02","ids":{"openalex":"https://openalex.org/W3198611694","doi":"https://doi.org/10.18293/seke2021-179","mag":"3198611694"},"language":"en","primary_location":{"id":"doi:10.18293/seke2021-179","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2021-179","pdf_url":"https://doi.org/10.18293/seke2021-179","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.18293/seke2021-179","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005963223","display_name":"Alok Chandrakant Ratnaparkhi","orcid":null},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alok Ratnaparkhi","raw_affiliation_strings":["Dept. of Computer & Information Science University of Massachusetts Dartmouth Dartmouth, MA, U.S.A"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer & Information Science University of Massachusetts Dartmouth Dartmouth, MA, U.S.A","institution_ids":["https://openalex.org/I100633361"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5005963223"],"corresponding_institution_ids":["https://openalex.org/I100633361"],"apc_list":null,"apc_paid":null,"fwci":0.2754,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6239278,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2021","issue":null,"first_page":"98","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12490","display_name":"Software Engineering and Design Patterns","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3303","display_name":"Development"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.8205897808074951},{"id":"https://openalex.org/keywords/software-design-pattern","display_name":"Software design pattern","score":0.7564654350280762},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7392904758453369},{"id":"https://openalex.org/keywords/structural-pattern","display_name":"Structural pattern","score":0.6453377604484558},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6204763054847717},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5706844329833984},{"id":"https://openalex.org/keywords/software-design","display_name":"Software design","score":0.5704975128173828},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5566043257713318},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.5322301983833313},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5197858214378357},{"id":"https://openalex.org/keywords/design-pattern","display_name":"Design pattern","score":0.5159695744514465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47380346059799194},{"id":"https://openalex.org/keywords/architectural-pattern","display_name":"Architectural pattern","score":0.4380810260772705},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42650213837623596},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3972132205963135},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36922934651374817},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.21862635016441345},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.13271111249923706},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1130872368812561},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0677679181098938}],"concepts":[{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.8205897808074951},{"id":"https://openalex.org/C146054899","wikidata":"https://www.wikidata.org/wiki/Q181156","display_name":"Software design pattern","level":3,"score":0.7564654350280762},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7392904758453369},{"id":"https://openalex.org/C164202143","wikidata":"https://www.wikidata.org/wiki/Q635280","display_name":"Structural pattern","level":5,"score":0.6453377604484558},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6204763054847717},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5706844329833984},{"id":"https://openalex.org/C52913732","wikidata":"https://www.wikidata.org/wiki/Q857102","display_name":"Software design","level":4,"score":0.5704975128173828},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5566043257713318},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.5322301983833313},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5197858214378357},{"id":"https://openalex.org/C14501506","wikidata":"https://www.wikidata.org/wiki/Q5253831","display_name":"Design pattern","level":2,"score":0.5159695744514465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47380346059799194},{"id":"https://openalex.org/C72280835","wikidata":"https://www.wikidata.org/wiki/Q635346","display_name":"Architectural pattern","level":5,"score":0.4380810260772705},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42650213837623596},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3972132205963135},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36922934651374817},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.21862635016441345},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.13271111249923706},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1130872368812561},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0677679181098938},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2021-179","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2021-179","pdf_url":"https://doi.org/10.18293/seke2021-179","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2021-179","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2021-179","pdf_url":"https://doi.org/10.18293/seke2021-179","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3198611694.pdf","grobid_xml":"https://content.openalex.org/works/W3198611694.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1487083903","https://openalex.org/W1649645444","https://openalex.org/W2084481113","https://openalex.org/W2134521102","https://openalex.org/W2252272901","https://openalex.org/W2399314100","https://openalex.org/W2908644926","https://openalex.org/W2981809210","https://openalex.org/W2995965185","https://openalex.org/W3082251832"],"related_works":["https://openalex.org/W2560421591","https://openalex.org/W2796094063","https://openalex.org/W2392503306","https://openalex.org/W2073810760","https://openalex.org/W3041665175","https://openalex.org/W2037721767","https://openalex.org/W1531468785","https://openalex.org/W2152250926","https://openalex.org/W2589805430","https://openalex.org/W4388483595"],"abstract_inverted_index":{"A":[0],"secure":[1,20,39,49,69,87,96],"design":[2,21,50,54,70,88],"pattern":[3],"is":[4],"a":[5,10,63,92],"well-proven":[6],"reusable":[7],"solution":[8],"to":[9,47,90],"recurring":[11],"security":[12],"problem":[13],"that":[14],"arise":[15],"in":[16,76],"specific":[17],"contexts.":[18],"Using":[19],"patterns":[22,40,51,71,89],"properly":[23],"can":[24],"help":[25],"tackle":[26],"software":[27,30,73,97],"vulnerabilities":[28,74,85],"during":[29],"development.":[31,98],"However,":[32],"the":[33,67,81,84],"lack":[34],"of":[35,38,65],"selection":[36],"guidance":[37],"makes":[41],"it":[42],"more":[43],"difficult":[44],"for":[45,72,95],"developers":[46],"use":[48],"than":[52],"conventional":[53],"patterns.":[55],"To":[56],"address":[57],"this":[58,60],"issue,":[59],"paper":[61],"presents":[62],"methodology":[64,79],"selecting":[66],"appropriate":[68],"formalized":[75],"anti-patterns.":[77],"This":[78],"bridges":[80],"gap":[82],"between":[83],"and":[86],"produce":[91],"useful":[93],"tool":[94]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
