The Embedded Systems Design Challenge, Proceedings of the 14th International Symposium on Formal Methods (FM), pp.1-15, 2006. ,
DOI : 10.1007/11813040_1
Weaving together requirements and architectures, Computer, vol.34, issue.3, pp.115-117, 2001. ,
DOI : 10.1109/2.910904
URL : http://oro.open.ac.uk/2213/1/00910904.pdf
Views on software engineering from the twin peaks of requirements and architecture, ACM SIGSOFT Software Engineering Notes, vol.38, issue.5, pp.40-42, 2013. ,
DOI : 10.1145/2507288.2507323
Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns, SDL Forum, pp.72-90, 2013. ,
DOI : 10.1007/978-3-642-38911-5_5
URL : https://hal.archives-ouvertes.fr/hal-01240715
Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS), pp.319-333, 2011. ,
DOI : 10.1201/9781420038163
Domain-Specific Modeling, 2007. ,
DOI : 10.1201/9781420010855.pt2
On the similarity between requirements and architecture, Journal of Systems and Software, vol.82, issue.3, pp.544-550, 2009. ,
DOI : 10.1016/j.jss.2008.11.185
The Security Twin Peaks, Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS), vol. LNCS 6542 of Lecture Notes in Computer Science, pp.167-180, 2011. ,
DOI : 10.1007/978-3-642-19125-1_13
An Approach to Identifying Inconsistencies in Model-based Systems Engineering, Proceedings of the 1st ACM SIG- SOFT workshop on Self-managed systems, WOSS '04, pp.354-362, 2004. ,
DOI : 10.1016/j.procs.2014.03.044
Using Security and Dependability Patterns for Reaction Processes, 2008 19th International Conference on Database and Expert Systems Applications, pp.315-319, 2008. ,
DOI : 10.1109/DEXA.2008.102
Security Engineering with Patterns -Origins, Theoretical Models, and New Applications, Lecture Notes in Computer Science, vol.2754, 2003. ,
Classifying relationships between objectoriented design patterns, Software Engineering Conference Proceedings. 1998 Australian, pp.98-107, 1998. ,
A Modeling and Formal Approach for the Precise Specification of Security Patterns, Engineering Secure Software and Systems -6th International Symposium, ESSoS 2014, pp.95-112, 2014. ,
DOI : 10.1007/978-3-319-04897-0_7
URL : https://hal.archives-ouvertes.fr/hal-01141439
On a formal framework for security properties, Computer Standards & Interfaces, vol.27, issue.5, pp.457-466, 2005. ,
DOI : 10.1016/j.csi.2005.01.004
A catalog of architectural primitives for modeling architectural patterns, Information and Software Technology, vol.50, issue.9-10, pp.1003-1034, 2008. ,
DOI : 10.1016/j.infsof.2007.09.003
Security patterns in practice: Building secure architectures using software patterns, Wiley Series on Software Design Patterns, 2013. ,