Home  Sitemap  Kontakt 





 


TZI

---------------
 
 
Home

Publications of M. Bunke

Journal Articles

  • BIB

    M. Bunke, R. Koschke, K. Sohr. Organizing Security Patterns Related to Security and Pattern Recognition Requirements. International Journal On Advances in Security July 2012; 5(1&2):46–67.

    @article{Bunke:IJOAS:2012,
      author    = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher = {XPS (Xpert Publishing Services)},
      title     = {Organizing Security Patterns Related to Security and Pattern Recognition Requirements},
      journal   = {International Journal On Advances in Security},
      issn      = {1942-2636},
      number    = {1\&2},
      month     = {July},
      volume    = {5},
      year      = {2012},
      pages     = {46--67},
    }

Conference and Workshop Articles

  • BIB DOI

    M. Bunke. On the Description of Software Security Patterns. Proceedings of the 19th European Conference on Pattern Languages of Programs, ACM, 2014; 34:1–34:10. New York, NY, USA.

    @inproceedings{Bunke:EUROPLOP:2014,
      author    = {Michaela Bunke},
      numpages  = {10},
      publisher = {ACM},
      doi       = {10.1145/2721956.2721990},
      isbn      = {978-1-4503-3416-7},
      title     = {On the Description of Software Security Patterns},
      url       = {http://doi.acm.org/10.1145/2721956.2721990},
      series    = {EuroPLoP '14},
      booktitle = {Proceedings of the 19th European Conference on Pattern Languages of Programs},
      acmid     = {2721990},
      location  = {Irsee, Germany},
      year      = {2014},
      keywords  = {design patterns, patterns, security patterns},
      articleno = {34},
      pages     = {34:1--34:10},
      address   = {New York, NY, USA},
    }
  • BIB

    S. Bartsch, B. Berger, M. Bunke, K. Sohr. The Transitivity-of-Trust Problem in Android Application Interaction. Eighth International Conference on Availability, Reliability and Security (ARES), 2013, IEEE Computer Society Press, 2013; 291–296.

    @inproceedings{Bartsch:ARES:2013,
      author    = {Steffen Bartsch and Bernhard Berger and Michaela Bunke and Karsten Sohr},
      publisher = {IEEE Computer Society Press},
      booktitle = {Eighth International Conference on Availability, Reliability and Security (ARES), 2013},
      year      = {2013},
      pages     = {291--296},
      title     = {The Transitivity-of-Trust Problem in Android Application Interaction},
    }
  • BIB

    B. Berger, M. Bunke, K. Sohr. An Android Security Case Study with Bauhaus. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 179–183.

    @inproceedings{Berger:WCRE:11,
      author    = {Bernhard Berger and Michaela Bunke and Karsten Sohr},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {179--183},
      title     = {An Android Security Case Study with Bauhaus},
    }
  • BIB

    M. Bunke, R. Koschke, K. Sohr. Application-Domain Classification for Security Patterns. International Conferences on Pervasive Patterns and Applications (PATTERNS), XPS (Xpert Publishing Services), 2011; 138–143. IARIA Conferences.

    @inproceedings{Bunke:PATTERNS:11,
      author       = {Michaela Bunke and Rainer Koschke and Karsten Sohr},
      publisher    = {XPS (Xpert Publishing Services)},
      isbn         = {978-1-61208-158-8},
      title        = {Application-Domain Classification for Security Patterns},
      booktitle    = {International Conferences on Pervasive Patterns and Applications (PATTERNS)},
      year         = {2011},
      organization = {IARIA Conferences},
      pages        = {138--143},
    }
  • BIB

    M. Bunke, K. Sohr. An Architecture-Centric Approach to Detecting Security Patterns in Software. International Symposium on Engineering Secure Software and Systems, volume 6542 of Lecture Notes in Computer Science, Springer Verlag, 2011; 156–166.

    @inproceedings{Bunke:ESSOS:2011,
      author    = {Michaela Bunke and Karsten Sohr},
      publisher = {Springer Verlag},
      isbn      = {978-3-642-19124-4},
      title     = {An Architecture-Centric Approach to Detecting Security Patterns in Software},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems},
      volume    = {6542},
      year      = {2011},
      pages     = {156--166},
    }

Further Publications

  • BIB

    B. Berger, M. Bunke. Software Security Comprehension. Softwaretechnik Trends may 2011; 31(2):30–31.

    @article{Berger:WSR:2011,
      author   = {Bernhard Berger and Michaela Bunke},
      title    = {Software Security Comprehension},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      month    = {may},
      volume   = {31},
      year     = {2011},
      pages    = {30--31},
    }





Arbeitsgruppe

Forschung

Lehre

Publikationen

Service

Kontakt

 

---------
BEDIENUNG
---------


SEITENINHALT DRUCKEN

LESEZEICHEN SETZEN

ENGLISH VERSION  






  SEITENANFANG
Hier geht es zur Homepage des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Universität Bremen