메뉴 건너뛰기




Volumn , Issue , 2005, Pages 224-233

Model-based design and analysis of permission-based security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; COMPUTER SYSTEMS; EMBEDDED SYSTEMS; JAVA PROGRAMMING LANGUAGE; NETWORK PROTOCOLS; SECURITY SYSTEMS;

EID: 27144534492     PISSN: 27708527     EISSN: 27708535     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (11)
  • 1
    • 27144479376 scopus 로고    scopus 로고
    • Formal methods diffusion: Past lessons and future prospects
    • F. Koornneef and M. van der Meulen, editors, Computer Safety, Reliability and Security (SAFECOMP 2000), Rotterdam, The Netherlands, Oct.
    • R. Bloomfield, D. Craigen, F. Koob, M. Ullmann, and S.Wittmann. Formal methods diffusion: Past lessons and future prospects. In F. Koornneef and M. van der Meulen, editors, Computer Safety, Reliability and Security (SAFECOMP 2000), volume 1943 of LNCS, pages 211-226, Rotterdam, The Netherlands, Oct. 2000.
    • (2000) LNCS , vol.1943 , pp. 211-226
    • Bloomfield, R.1    Craigen, D.2    Koob, F.3    Ullmann, M.4    Wittmann, S.5
  • 2
    • 45849114537 scopus 로고    scopus 로고
    • Using aspects to design a secure system
    • IEEE Computer Society
    • G. Georg, I. Ray, and R. B. France. Using aspects to design a secure system. In ICECCS, pages 117-. IEEE Computer Society, 2002.
    • (2002) ICECCS , pp. 117
    • Georg, G.1    Ray, I.2    France, R.B.3
  • 3
    • 4444362674 scopus 로고    scopus 로고
    • Modeling complex systems by separating application and security concerns
    • [5]
    • H. Gomaa and M. E. Shin. Modeling complex systems by separating application and security concerns. In ICECCS [5], pages 19-28.
    • ICECCS , pp. 19-28
    • Gomaa, H.1    Shin, M.E.2
  • 7
  • 8
    • 33144472884 scopus 로고    scopus 로고
    • Modeling role-based access control using parameterized UML models
    • M. Wermelinger and T. Margaria, editors, FASE. Springer
    • D.-K. Kim, I. Ray, R. B. France, and N. Li. Modeling role-based access control using parameterized UML models. In M. Wermelinger and T. Margaria, editors, FASE, volume 2984 of LNCS, pages 180-193. Springer, 2004.
    • (2004) LNCS , vol.2984 , pp. 180-193
    • Kim, D.-K.1    Ray, I.2    France, R.B.3    Li, N.4
  • 9
    • 35048852597 scopus 로고    scopus 로고
    • Correct oo systems in computational logic
    • M. Bruynooghe, editor, LOPSTR, Springer
    • K.-K. Lau and M. Ornaghi. Correct oo systems in computational logic. In M. Bruynooghe, editor, LOPSTR, volume 3018 of LNCS, pages 34-53. Springer, 2003.
    • (2003) LNCS , vol.3018 , pp. 34-53
    • Lau, K.-K.1    Ornaghi, M.2
  • 10
    • 4444358787 scopus 로고    scopus 로고
    • Dealing with complex networks of process interactions: A security measure
    • [5]
    • P. Periorellis, O. C. Idowu, S. J. Lynden, M. P. Young, and P. András. Dealing with complex networks of process interactions: A security measure. In ICECCS [5], pages 29-36.
    • ICECCS , pp. 29-36
    • Periorellis, P.1    Idowu, O.C.2    Lynden, S.J.3    Young, M.P.4    András, P.5
  • 11
    • 27144472652 scopus 로고    scopus 로고
    • Major threat: From formal methods without tools to tools without formal methods
    • [5]
    • B. Steffen. Major threat: From formal methods without tools to tools without formal methods. In ICECCS [5], page 15.
    • ICECCS , pp. 15
    • Steffen, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.