-
2
-
-
0242276148
-
Consistent and complete access control policies in use cases
-
Perdita Stevens, Jon Whittle, and Grady Booch, editors, UML 2003 - The Unified Modeling Language. Model Languages and Applications. 6th International Conference, San Francisco, CA, USA, October 2003, Proceedings, Springer
-
K. Alghathbar and D. Wijeskera. Consistent and complete access control policies in use cases. In Perdita Stevens, Jon Whittle, and Grady Booch, editors, UML 2003 - The Unified Modeling Language. Model Languages and Applications. 6th International Conference, San Francisco, CA, USA, October 2003, Proceedings, volume 2863 of LNCS, pages 373-387. Springer, 2003.
-
(2003)
LNCS
, vol.2863
, pp. 373-387
-
-
Alghathbar, K.1
Wijeskera, D.2
-
4
-
-
0003400251
-
Secure computer systems: Mathematical foundations model
-
Mitre Corporation
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations model. Technical report, Mitre Corporation, 1975.
-
(1975)
Technical Report
-
-
Bell, D.1
LaPadula, L.2
-
6
-
-
14944384797
-
Security through aspect-oriented programming
-
Kluwer, B.V.
-
B. De Win, B. Vanhaute, and B. De Decker. Security through aspect-oriented programming. In Proceedings of the IFIP TC11 WG 11.4 First Annual Working Conference on Network Security, pages 125-138. Kluwer, B.V., 2001.
-
(2001)
Proceedings of the IFIP TC11 WG 11.4 First Annual Working Conference on Network Security
, pp. 125-138
-
-
De Win, B.1
Vanhaute, B.2
De Decker, B.3
-
7
-
-
26444562216
-
UML design with security integration as a first class citizen
-
Cairo, December
-
T. Doan, S. Demurjian, R. Ammar, and T.C. Ting. UML design with security integration as a first class citizen. In Proc. of 3rd Intl. Conf. on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA '04), Cairo, December 2004.
-
(2004)
Proc. of 3rd Intl. Conf. on Computer Science, Software Engineering, Information Technology, E-Business, and Applications (CSITeA '04)
-
-
Doan, T.1
Demurjian, S.2
Ammar, R.3
Ting, T.C.4
-
8
-
-
20444505719
-
MAC and UML for secure software design
-
Washington D.C., October
-
T. Doan, S. Demurjian, T.C. Ting, and A. Ketterl. MAC and UML for secure software design. In Proc. of 2nd ACM Wksp. on Formal Methods in Security Engineering, Washington D.C., October 2004.
-
(2004)
Proc. of 2nd ACM Wksp. on Formal Methods in Security Engineering
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
9
-
-
26444587977
-
RBAC/MAC security for UML
-
C. Farkas and P. Samarati, editors, July
-
T. Doan, S. Demurjian, T.C. Ting, and C. Phillips. RBAC/MAC security for UML. In C. Farkas and P. Samarati, editors, Research Directions in Data and Applications Security XVIII, July 2004.
-
(2004)
Research Directions in Data and Applications Security XVIII
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Phillips, C.4
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.4
Chandramouli, R.5
-
15
-
-
0000713886
-
Aspect-oriented programming
-
G. Kiczales. Aspect-oriented programming. ACM Comput. Surv., 28(4es):154, 1996.
-
(1996)
ACM Comput. Surv.
, vol.28
, Issue.4 ES
, pp. 154
-
-
Kiczales, G.1
-
17
-
-
84861255280
-
OMG-unified modeling language, v.l.5
-
March
-
OMG. OMG-unified modeling language, v.l.5. UML Resource Page http://www.omg.org/uml, March 2003.
-
(2003)
UML Resource Page
-
-
-
18
-
-
30644467106
-
Verifiable composition of access control features and applications
-
E. Song, R. Reddy, R. France, I. Ray, G. Georg, and R. Alexander. Verifiable composition of access control features and applications. In Proceedings of 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005), 2005.
-
(2005)
Proceedings of 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005)
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
-
19
-
-
0032643249
-
Stanley. N degrees of separation: Multi-dimensional separation of concerns
-
IEEE Computer Society Press
-
P. Tarr, H. Ossher, W. Harrison, and M. Sutton, Jr. Stanley. N degrees of separation: multi-dimensional separation of concerns. In Proceedings of the 21st international conference on Software engineering, pages 107-119. IEEE Computer Society Press, 1999.
-
(1999)
Proceedings of the 21st International Conference on Software Engineering
, pp. 107-119
-
-
Tarr, P.1
Ossher, H.2
Harrison, W.3
Sutton Jr., M.4
-
20
-
-
84982871639
-
Role based access control framework for network enterprises
-
Phoenix, AZ, December 7-11
-
D. Thomsen, D. O'Brien, and J. Bogle. Role based access control framework for network enterprises. In Proceedings of 14th Annual Computer Security Application Conference, pages 50-58, Phoenix, AZ, December 7-11 1998.
-
(1998)
Proceedings of 14th Annual Computer Security Application Conference
, pp. 50-58
-
-
Thomsen, D.1
O'Brien, D.2
Bogle, J.3
|