Cite
Architecting software with security patterns
MLA
Scandariato, Riccardo, et al. Architecting Software with Security Patterns. Apr. 2008. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.od......1131..796718609ba8cde185839e412f1f0f58&authtype=sso&custid=ns315887.
APA
Scandariato, R., Yskout, K., Heyman, T., & Joosen, W. (2008). Architecting software with security patterns.
Chicago
Scandariato, Riccardo, Koen Yskout, Thomas Heyman, and Wouter Joosen. 2008. “Architecting Software with Security Patterns,” April. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.od......1131..796718609ba8cde185839e412f1f0f58&authtype=sso&custid=ns315887.