A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

P. A. Bernstein and U. Dayal, An Overview of Repository Technology, Proceedings of the 20th International Conference on Very Large Data Bases, VLDB '94, pp.705-713, 1994.

R. Birukou, E. Blanzieri, P. Giorgini, and M. Weiss, Facilitating pattern repository access with the implicit culture framework, Proceedings of " EuroPLoP, 2007.

G. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern-Oriented Software Architecture: a system of patterns, 1996.

R. B. France, J. M. Bieman, and B. H. Cheng, Repository for Model Driven Development (Re- MoDD), MoDELS Workshops'06, pp.311-317, 2006.
DOI : 10.1109/icse.2012.6227059

R. Girardi and A. N. Lindoso, An ontology-based knowledge base for the representation and reuse of software patterns, ACM SIGSOFT Software Engineering Notes, vol.31, issue.1, pp.1-6, 2006.
DOI : 10.1145/1108768.1108772

B. Hamid, N. Desnos, C. Grepet, and C. Jouvray, Model-based security and dependability patterns in RCES, Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, S&D4RCES '10, 2010.
DOI : 10.1145/1868433.1868444

B. Hamid, S. Gurgens, C. Jouvray, and N. Desnos, Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MOD- ELS), pp.319-333, 2011.
DOI : 10.1201/9781420038163

T. Holmes, U. Zdun, and S. Dustdar, MORSE: A Model-Aware service environment, 2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 2009.
DOI : 10.1109/APSCC.2009.5394083

I. Iec, Standard: ISO/IEC 13335, 2004.

C. Mayr, U. Zdun, and S. Dustdar, Reusable Architectural Decision Model for Model and Metadata Repositories, FMCO, pp.1-20, 2008.
DOI : 10.1007/978-3-540-87875-9_30

. Oasis, ebXML: Oasis Registry Services Specification v2, 2003.

S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004.
DOI : 10.1145/1015047.1015049

D. Riehle and H. Züllighoven, Understanding and using patterns in software development, Theory and Practice of Object Systems, vol.2, issue.1, pp.3-13, 1996.
DOI : 10.1002/(SICI)1096-9942(1996)2:1<3::AID-TAPO1>3.0.CO;2-#

C. Sapia, M. Blaschka, and G. Höfling, GraMMi: using a standard repository management system to build a generic graphical modeling tool, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.8058, 2000.
DOI : 10.1109/HICSS.2000.927020

M. Schumacher, Security Engineering with Patterns -Origins, Theoretical Models, and New Applications, Lecture Notes in Computer Science, vol.2754, 2003.

A. Ziani, B. Hamid, and S. Trujillo, Towards a Unified Meta-model for Resources-Constrained Embedded Systems, 2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications, pp.485-492, 2011.
DOI : 10.1109/SEAA.2011.79