Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
An Overview of Repository Technology, Proceedings of the 20th International Conference on Very Large Data Bases, VLDB '94, pp.705-713, 1994. ,
Facilitating pattern repository access with the implicit culture framework, Proceedings of " EuroPLoP, 2007. ,
Pattern-Oriented Software Architecture: a system of patterns, 1996. ,
Repository for Model Driven Development (Re- MoDD), MoDELS Workshops'06, pp.311-317, 2006. ,
DOI : 10.1109/icse.2012.6227059
An ontology-based knowledge base for the representation and reuse of software patterns, ACM SIGSOFT Software Engineering Notes, vol.31, issue.1, pp.1-6, 2006. ,
DOI : 10.1145/1108768.1108772
Model-based security and dependability patterns in RCES, Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, S&D4RCES '10, 2010. ,
DOI : 10.1145/1868433.1868444
Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MOD- ELS), pp.319-333, 2011. ,
DOI : 10.1201/9781420038163
MORSE: A Model-Aware service environment, 2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 2009. ,
DOI : 10.1109/APSCC.2009.5394083
Standard: ISO/IEC 13335, 2004. ,
Reusable Architectural Decision Model for Model and Metadata Repositories, FMCO, pp.1-20, 2008. ,
DOI : 10.1007/978-3-540-87875-9_30
ebXML: Oasis Registry Services Specification v2, 2003. ,
Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004. ,
DOI : 10.1145/1015047.1015049
Understanding and using patterns in software development, Theory and Practice of Object Systems, vol.2, issue.1, pp.3-13, 1996. ,
DOI : 10.1002/(SICI)1096-9942(1996)2:1<3::AID-TAPO1>3.0.CO;2-#
GraMMi: using a standard repository management system to build a generic graphical modeling tool, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.8058, 2000. ,
DOI : 10.1109/HICSS.2000.927020
Security Engineering with Patterns -Origins, Theoretical Models, and New Applications, Lecture Notes in Computer Science, vol.2754, 2003. ,
Towards a Unified Meta-model for Resources-Constrained Embedded Systems, 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications, pp.485-492, 2011. ,
DOI : 10.1109/SEAA.2011.79