메뉴 건너뛰기




Volumn , Issue , 2004, Pages 115-124

Sound development of secure service-based systems

Author keywords

AutoFocus; Automotive; Model based Software Engineering; Security; Service based Systems; UML

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER PROGRAMMING LANGUAGES; MATHEMATICAL MODELS; PROJECT MANAGEMENT; SECURITY OF DATA; SOFTWARE PROTOTYPING;

EID: 20444440807     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1035167.1035185     Document Type: Conference Paper
Times cited : (38)

References (29)
  • 3
    • 1542347194 scopus 로고    scopus 로고
    • Modeling and validation of service-oriented architectures: Application vs. style
    • ACM
    • L. Baresi, R. Heckel, S. Thüne, and D. Varró. Modeling and validation of service-oriented architectures: application vs. style. In ESEC / SIGSOFT FSE, pages 68-77. ACM, 2003.
    • (2003) ESEC / SIGSOFT FSE , pp. 68-77
    • Baresi, L.1    Heckel, R.2    Thüne, S.3    Varró, D.4
  • 4
    • 34250199932 scopus 로고    scopus 로고
    • Modeling services and layered architectures
    • H. König, M. Heiner, and A. Wolisz, editors, Formal Techniques for Networked and Distributed Systems. springer
    • M. Broy. Modeling Services and Layered Architectures. In H. König, M. Heiner, and A. Wolisz, editors, Formal Techniques for Networked and Distributed Systems, volume 2767 of Lecture Notes in Computer Science, pages 48-61. springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2767 , pp. 48-61
    • Broy, M.1
  • 5
    • 20444432539 scopus 로고    scopus 로고
    • AutoFocus - Ein Werkzeugprototyp zur Entwicklung eingebetteter Systeme
    • M. Broy, F. Huber, and B. Schätz. AutoFocus - Ein Werkzeugprototyp zur Entwicklung eingebetteter Systeme. Informatik Forschung und Entwicklung, 14(3):121-134, 1999.
    • (1999) Informatik Forschung und Entwicklung , vol.14 , Issue.3 , pp. 121-134
    • Broy, M.1    Huber, F.2    Schätz, B.3
  • 10
    • 0001449325 scopus 로고
    • Temporal and modal logic
    • J. van Leeuwen, editor, chapter 16. Elsevier Science Publishers
    • E. A. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. Elsevier Science Publishers, 1990.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 995-1072
    • Emerson, E.A.1
  • 11
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • I.-Y. Song, S. Liddle, T. Ling, and P. Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003). Springer
    • P. Giorgini, F. Massacci, and J. Mylopoulos. Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In I.-Y. Song, S. Liddle, T. Ling, and P. Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), volume 2813 of LNCS, pages 263-276. Springer, 2003.
    • (2003) LNCS , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 12
    • 18944394652 scopus 로고    scopus 로고
    • Modelling and verification of layered security protocols: A bank application. in Computer Safety, Reliability, and Security (SAFECOMP 2003)
    • . Springer
    • J. Grünbauer, H. Hollmann, J. Jürjens, and G. Wimmel. Modelling and verification of layered security protocols: A bank application. In Computer Safety, Reliability, and Security (SAFECOMP 2003), volume 2788 of LNCS, pages 116-129. Springer, 2003.
    • (2003) LNCS , vol.2788 , pp. 116-129
    • Grünbauer, J.1    Hollmann, H.2    Jürjens, J.3    Wimmel, G.4
  • 14
    • 0004144738 scopus 로고    scopus 로고
    • ITU. ITU-TS Recommendation Z.120. ITU-TS, Geneva
    • ITU. ITU-TS Recommendation Z.120: Message Sequence Chart (MSC). ITU-TS, Geneva, 1996.
    • (1996) Message Sequence Chart (MSC)
  • 16
    • 84904204049 scopus 로고    scopus 로고
    • Security modelling for electronic commerce: The common electronic purse specifications
    • International Federation for Information Processing (IFIP), Kluwer Academic Publishers
    • J. Jürjens and G. Wimmel. Security modelling for electronic commerce: The Common Electronic Purse Specifications. In I3E 2001, pages 489-506. International Federation for Information Processing (IFIP), Kluwer Academic Publishers, 2001.
    • (2001) I3E 2001 , pp. 489-506
    • Jürjens, J.1    Wimmel, G.2
  • 19
    • 20444451053 scopus 로고    scopus 로고
    • In German
    • MEWADIS Projekt Homepage MEWADIS website at http://www4.in.tum.de/~mewadis. In German.
    • MEWADIS Projekt Homepage
  • 21
    • 35248898039 scopus 로고    scopus 로고
    • Model driven service composition
    • M. E. Orlowska, S. Weerawarana, M. P. Papazoglou, and J. Yang, editors, First International Conference on Service-Oriented Computing (ICSOC 2003), Trento, Italy, December 15-18. Springer
    • B. Orriëns, J. Yang, and M. P. Papazoglou. Model driven service composition. In M. E. Orlowska, S. Weerawarana, M. P. Papazoglou, and J. Yang, editors, First International Conference on Service-Oriented Computing (ICSOC 2003), volume 2910 of LNCS, pages 75-90, Trento, Italy, December 15-18 2003. Springer.
    • (2003) LNCS , vol.2910 , pp. 75-90
    • Orriëns, B.1    Yang, J.2    Papazoglou, M.P.3
  • 25
    • 0038594096 scopus 로고    scopus 로고
    • Quest: Overview over the project
    • D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors. Springer LNCS 1641
    • O. Slotosch. Quest: Overview over the Project. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998.
    • (1998) Applied Formal Methods - FM-Trends 98 , pp. 346-350
    • Slotosch, O.1
  • 29
    • 20444448320 scopus 로고    scopus 로고
    • Extended description techniques for security engineering
    • M. Dupuy and P. Paradinas, editors, ff. International Federation for Information Processing (IFIP), Kluwer Academic Publishers. Proceedings of SEC 2001 - 16th International Conference on Information Security
    • G. Wimmel and A. Wißpeintner. Extended description techniques for security engineering. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, page 469ff. International Federation for Information Processing (IFIP), Kluwer Academic Publishers, 2001. Proceedings of SEC 2001 - 16th International Conference on Information Security.
    • (2001) Trusted Information: the New Decade Challenge , pp. 469
    • Wimmel, G.1    Wißpeintner, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.