T. Henzinger and J. Sifakis, The Embedded Systems Design Challenge, Proceedings of the 14th International Symposium on Formal Methods (FM), pp.1-15, 2006.
DOI : 10.1007/11813040_1

B. Nuseibeh, Weaving together requirements and architectures, Computer, vol.34, issue.3, pp.115-117, 2001.
DOI : 10.1109/2.910904

URL : http://oro.open.ac.uk/2213/1/00910904.pdf

M. Galster, M. Mirakhorli, J. Cleland-huang, J. Burge, X. Franch et al., Views on software engineering from the twin peaks of requirements and architecture, ACM SIGSOFT Software Engineering Notes, vol.38, issue.5, pp.40-42, 2013.
DOI : 10.1145/2507288.2507323

B. Hamid, J. Geisel, A. Ziani, J. Bruel, and J. Perez, Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns, SDL Forum, pp.72-90, 2013.
DOI : 10.1007/978-3-642-38911-5_5

URL : https://hal.archives-ouvertes.fr/hal-01240715

B. Hamid, S. Gurgens, C. Jouvray, and N. Desnos, Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS), pp.319-333, 2011.
DOI : 10.1201/9781420038163

J. Gray, J. Tolvanen, S. Kelly, A. Gokhale, S. Neema et al., Domain-Specific Modeling, 2007.
DOI : 10.1201/9781420010855.pt2

R. De-boer and H. V. Vliet, On the similarity between requirements and architecture, Journal of Systems and Software, vol.82, issue.3, pp.544-550, 2009.
DOI : 10.1016/j.jss.2008.11.185

T. Heyman, K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, The Security Twin Peaks, Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS), vol. LNCS 6542 of Lecture Notes in Computer Science, pp.167-180, 2011.
DOI : 10.1007/978-3-642-19125-1_13

S. J. Herzig, A. Qamar, C. J. Paredis, D. Schilling, and H. Giese, An Approach to Identifying Inconsistencies in Model-based Systems Engineering, Proceedings of the 1st ACM SIG- SOFT workshop on Self-managed systems, WOSS '04, pp.354-362, 2004.
DOI : 10.1016/j.procs.2014.03.044

V. D. Giacomo, M. Felici, V. Meduri, D. Presenza, C. Riccucci et al., Using Security and Dependability Patterns for Reaction Processes, 2008 19th International Conference on Database and Expert Systems Applications, pp.315-319, 2008.
DOI : 10.1109/DEXA.2008.102

M. Schumacher, Security Engineering with Patterns -Origins, Theoretical Models, and New Applications, Lecture Notes in Computer Science, vol.2754, 2003.

J. Noble, Classifying relationships between objectoriented design patterns, Software Engineering Conference Proceedings. 1998 Australian, pp.98-107, 1998.

B. Hamid and C. Percebois, A Modeling and Formal Approach for the Precise Specification of Security Patterns, Engineering Secure Software and Systems -6th International Symposium, ESSoS 2014, pp.95-112, 2014.
DOI : 10.1007/978-3-319-04897-0_7

URL : https://hal.archives-ouvertes.fr/hal-01141439

S. Gürgens, P. Ochsenschläger, and C. Rudolph, On a formal framework for security properties, Computer Standards & Interfaces, vol.27, issue.5, pp.457-466, 2005.
DOI : 10.1016/j.csi.2005.01.004

U. Zdun and P. Avgeriou, A catalog of architectural primitives for modeling architectural patterns, Information and Software Technology, vol.50, issue.9-10, pp.1003-1034, 2008.
DOI : 10.1016/j.infsof.2007.09.003

E. B. Fernandez, Security patterns in practice: Building secure architectures using software patterns, Wiley Series on Software Design Patterns, 2013.