Monthly Archives: May 2012
We are aware of the following contributions which focus on security (and somehow related) patterns. In order to reflect the evolution of security patterns they are presented in chronological order (most recent patterns first).
Ed has pioneered the field of Security Patterns. He frequently publishes patterns and books on our beloved topic. Ed’s bio on his Website: “Since 1984 I have been a Professor of Computer Science and Engineering at FAU. Before that, I … Continue reading