
 
REFERENCES 
Abu-Matar, M. and Gomaa, H., 2011, August. Variability 
modeling  for  service  oriented  product  line 
architectures.  In  Software  Product  Line  Conference 
(SPLC), 2011 15th International (pp. 110-119). IEEE. 
Al-Azzani, S.  and  Bahsoon,  R., 2012,  August. SecArch: 
Architecture-level evaluation and testing for security. 
In Software  Architecture  (WICSA)  and  European 
Conference  on  Software  Architecture  (ECSA),  2012 
Joint Working IEEE/IFIP Conference on (pp. 51-60).  
Albassam, E., Gomaa, H. and Menascé, D.A., 2016, July. 
Model-based Recovery Connectors for Self-adaptation 
and Self-healing. In ICSOFT-EA (pp. 79-90). 
Basin, D., Clavel, M. and Egea, M., 2011, June. A decade 
of  model-driven  security. In Proceedings  of  the  16th 
ACM  symposium  on  Access  control  models  and 
technologies (pp. 1-10). ACM. 
Farahmandian, S. and Hoang, D.B., 2017, October. SDS
2
: 
A  novel  software-defined  security  service  for 
protecting cloud computing infrastructure. In Network 
Computing and Applications (NCA), 2017 IEEE 16th 
International Symposium on (pp. 1-8). IEEE. 
Fant,  J.S.,  Gomaa,  H.  and  Pettit,  R.G.,  2015,  July. 
Integrating and applying architectural design patterns 
in  space  flight  software  product  lines.  In  Software 
Technologies (ICSOFT), 2015 10th International Joint 
Conference on (Vol. 1, pp. 1-11). IEEE. 
Fernandez-Buglioni,  E.,  2013. Security  patterns  in 
practice:  designing  secure  architectures  using 
software patterns. John Wiley & Sons. 
Gomaa, H., Menascé, D.A. & Shin, M.E., 2001. Reusable 
component  interconnection  patterns  for  distributed 
software  architectures.  Proceedings  of  the  2001 
symposium  on  Software  reusability  putting  software 
reuse in context - SSR 01. 
Gomaa, H. and Shin, M.E., 2004,  July. A multiple-view 
meta-modeling  approach  for  variability  management 
in software product lines. In International Conference 
on  Software  Reuse  (pp.  274-285).  Springer,  Berlin, 
Heidelberg. 
Gomaa, H., 2005. Designing software product lines with 
UML:  from  use  cases  to  pattern-based  software 
architectures, Boston: Addison-Wesley. 
Gomaa,  H.  and  Shin,  M.E.,  2007,  January.  Automated 
software  product  line  engineering  and  product 
derivation.  In  System  Sciences,  2007.  HICSS  2007. 
40th Annual Hawaii International Conference on (pp. 
285a-285a). IEEE. 
Gomaa,  H.  and  Shin,  M.E.,  2008.  Multiple-view 
modelling  and  meta-modelling  of  software  product 
lines. IET software, 2(2), pp.94-122. 
Gomaa,  H.,  Hashimoto,  K.,  Kim,  M.,  Malek,  S.  and 
Menascé,  D.A.,  2010,  March.  Software  adaptation 
patterns  for  service-oriented  architectures. 
In Proceedings  of  the  2010  ACM  Symposium  on 
Applied Computing (pp. 462-469). ACM. 
Gomaa, H. and Shin, M.E., 2010. Variability modeling in 
model-driven  software  product  line  engineering.  In 
Proceedings  of  the  2nd  International  Workshop  on 
Model  Driven  Product  Line  Engineering  (MDPLE 
2010) (p. 65). 
Gomaa,  H.,  2011. Software  modeling  and  design:  UML, 
use  cases,  patterns,  and  software  architectures. 
Cambridge University Press. 
Jürjens,  J.,  2002,  September.  UMLsec:  Extending  UML 
for  secure  systems  development.  In International 
Conference  on  The  Unified  Modeling  Language (pp. 
412-425). Springer, Berlin, Heidelberg. 
Lodderstedt, T., Basin, D. and Doser, J., 2002, September. 
SecureUML:  A  UML-based  modeling  language  for 
model-driven security. In International Conference on 
the  Unified  Modeling  Language (pp.  426-441). 
Springer, Berlin, Heidelberg. 
Medvidovic,  N.  and  Taylor,  R.N.,  2010,  May.  Software 
architecture:  foundations,  theory,  and  practice. 
In Software  Engineering,  2010  ACM/IEEE  32nd 
International  Conference  on (Vol.  2,  pp.  471-472). 
IEEE. 
Ren, J., Taylor, R., Dourish, P. and Redmiles, D., 2005, 
May. Towards  an  architectural  treatment of  software 
security:  a  connector-centric  approach.  In ACM 
SIGSOFT Software Engineering Notes (Vol. 30, No. 4, 
pp. 1-7). ACM. 
Schneider,  R.,  2005.  Designing  Software  Product  Lines 
with  UML:  From  Use  Cases  to  Pattern-Based 
Software  Architectures. Software  Quality 
Professional, 7(4), p.46. 
Schumacher,  M.,  Fernandez,  E.B.,  Hybertson,  D., 
Buschmann,  F.  and  Sommerlad,  P.,  2006.  Security 
Patterns, J. 
Shin, M.E.  and Gomaa, H.,  2007.  Software modeling  of 
evolution to a secure application: From requirements 
model  to  software  architecture. Sci.  Comput. 
Program, 66(1), pp.60-70.   
Shin, M.E., Malhotra, B., Gomaa, H. and Kang, T., 2012, 
July.  Connectors  for  Secure  Software  Architectures. 
In SEKE (pp. 394-399).  
Shin,  M.E.,  Gomaa,  H.,  Pathirage,  D.,  Baker,  C.  and 
Malhotra,  B.,  2016.  Design  of  Secure  Software 
Architectures  with  Secure  Connectors. International 
Journal  of  Software  Engineering  and  Knowledge 
Engineering, 26(05), pp.769-805. 
Shin,  M.,  Gomaa,  H.  and  Pathirage,  D.,  2016,  June. 
Reusable  Secure  Connectors  for  Secure  Software 
Architecture. In International Conference on Software 
Reuse (pp. 181-196). Springer, Cham.  
Shin,  M.,  Gomaa,  H.  and  Pathirage,  D.,  2017.  Model-
based  Design  of  Reusable  Secure  Connectors.  In 4st 
International Workshop on Interplay of Model-Driven 
and  Component-Based  Software  Engineering 
(ModComp) 2017 Workshop Pre-proceedings (p. 6).   
Taha, A., Trapero, R., Luna, J. and Suri, N., 2017, June. A 
Framework  for  Ranking  Cloud  Security  Services. 
In Services  Computing  (SCC),  2017  IEEE 
International Conference on (pp. 322-329). IEEE. 
Tzeremes,  V.  and  Gomaa,  H.,  2018,  January.  Applying 
End  User  Software  Product  Line  Engineering  for 
Smart  Spaces.  In  Proceedings  of  the  51st  Hawaii 
International Conference on System Sciences. 
A Software Product Line Approach for Feature Modeling and Design of Secure Connectors
517