메뉴 건너뛰기




Volumn 4111 LNCS, Issue , 2006, Pages 64-87

Model-based security engineering with UML: Introducing security aspects

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; CONSTRAINT THEORY; FORMAL LANGUAGES; MATHEMATICAL MODELS; OBJECT ORIENTED PROGRAMMING; SYSTEMS ANALYSIS;

EID: 33749646163     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11804192_4     Document Type: Conference Paper
Times cited : (4)

References (25)
  • 1
    • 24644452014 scopus 로고    scopus 로고
    • Object connectivity and full abstraction for a concurrent calculus of classes
    • [ABdBS04]
    • [ABdBS04] E. Ábráham, M.M. Bonsangue, F.S. de Boer, and M. Steffen. Object connectivity and full abstraction for a concurrent calculus of classes. In ICTAC 2004, pages 37-51, 2004.
    • (2004) ICTAC 2004 , pp. 37-51
    • Ábráham, E.1    Bonsangue, M.M.2    De Boer, F.S.3    Steffen, M.4
  • 2
    • 84941158422 scopus 로고    scopus 로고
    • [Abs04] AbsInt. aicall
    • [Abs04] AbsInt. aicall. http://www.aicall.de/, 2004.
    • (2004)
  • 3
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • [AJ01] N. Kobayashi and B. C. Pierce, editors, Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001). Springer
    • [AJ01] M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In N. Kobayashi and B. C. Pierce, editors, Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001), volume 2215 of LNCS, pages 82-94. Springer, 2001.
    • (2001) LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürjens, J.2
  • 7
    • 79956148893 scopus 로고
    • Control flow versus logic: A denotational and a declarative model for guarded Horn clauses
    • [dBKPR89]
    • [dBKPR89] F.S. de Boer, J.N. Koek, C. Palamidessi, and J.J.M.M. Rutten. Control flow versus logic: a denotational and a declarative model for guarded Horn clauses. In MFCS 1989, pages 165-176, 1989.
    • (1989) MFCS 1989 , pp. 165-176
    • De Boer, F.S.1    Koek, J.N.2    Palamidessi, C.3    Rutten, J.J.M.M.4
  • 8
    • 84937546528 scopus 로고    scopus 로고
    • Abstracting C with abC
    • [DHH02]
    • [DHH02] D. Dams, W. Hesse, and G.J. Holzmann. Abstracting C with abC. In CAV 2002, pages 515-520, 2002.
    • (2002) CAV 2002 , pp. 515-520
    • Dams, D.1    Hesse, W.2    Holzmann, G.J.3
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [DY83]
    • [DY83] D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29 (2): 198-208, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 11
    • 5744230994 scopus 로고    scopus 로고
    • Aspect-oriented approach to early design modelling
    • [FRGG04]
    • [FRGG04] R.B. France, I. Ray, G. Georg, and S. Ghosh. Aspect-oriented approach to early design modelling. IEE Proceedings - Software, 151(4):173-186, 2004.
    • (2004) IEE Proceedings - Software , vol.151 , Issue.4 , pp. 173-186
    • France, R.B.1    Ray, I.2    Georg, G.3    Ghosh, S.4
  • 12
    • 33646800880 scopus 로고    scopus 로고
    • 29 new unclarities in the semantics of UML 2.0 state machines
    • [FSKdR05]
    • [FSKdR05] H. Fecher, J. Schönborn, M. Kyas, and W.P. de Roever. 29 new unclarities in the semantics of UML 2.0 state machines. In ICFEM 2005, pages 52-65, 2005.
    • (2005) ICFEM 2005 , pp. 52-65
    • Fecher, H.1    Schönborn, J.2    Kyas, M.3    De Roever, W.P.4
  • 13
    • 33947285148 scopus 로고    scopus 로고
    • Abstract state machines
    • [Gur00] T. Rus, editor, 8th International Conference on Algebraic Methodology and Software Technology (AMAST 2000). Springer
    • [Gur00] Y. Gurevich. Abstract state machines. In T. Rus, editor, 8th International Conference on Algebraic Methodology and Software Technology (AMAST 2000), volume 1816 of LNCS. Springer, 2000.
    • (2000) LNCS , vol.1816
    • Gurevich, Y.1
  • 15
    • 0242339578 scopus 로고    scopus 로고
    • STAIRS - Steps to analyze interactions with refinement semantics
    • [HS03]. P. Stevens, editor, The Unified Modeling Language (UML 2003). Springer. 6th International Conference
    • [HS03] Ø. Haugen and K. Stølen. STAIRS - steps to analyze interactions with refinement semantics. In P. Stevens, editor, The Unified Modeling Language (UML 2003), volume 2863 of LNCS, pages 388-402. Springer, 2003. 6th International Conference.
    • (2003) LNCS , vol.2863 , pp. 388-402
    • Haugen, Ø.1    Stølen, K.2
  • 17
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • [Jür01] H. Hußmann, editor, 4th International Conference on Fundamental Approaches to Software Engineering (FASE). Springer
    • [Jür01] J. Jürjens. Towards development of secure systems using UMLsec. In H. Hußmann, editor, 4th International Conference on Fundamental Approaches to Software Engineering (FASE), volume 2029 of LNCS, pages 187-200. Springer, 2001.
    • (2001) LNCS , vol.2029 , pp. 187-200
    • Jürjens, J.1
  • 18
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • [Jür02] J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, 5th International Conference on the Unified Modeling Language (UML 2002). Springer
    • [Jür02] J. Jürjens. UMLsec: Extending UML for secure systems development. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, 5th International Conference on the Unified Modeling Language (UML 2002), volume 2460 of LNCS, pages 412-425. Springer, 2002.
    • (2002) LNCS , vol.2460 , pp. 412-425
    • Jürjens, J.1
  • 20
    • 33846318194 scopus 로고    scopus 로고
    • Code security analysis of a biometric authentication system using automated theorem provers
    • [Jür05a]. IEEE
    • [Jür05a] J. Jürjens. Code security analysis of a biometric authentication system using automated theorem provers. In 21st Annual Computer Security 'Applications Conference (ACSAC 2005). IEEE, 2005.
    • (2005) 21st Annual Computer Security 'Applications Conference (ACSAC 2005)
    • Jürjens, J.1
  • 22
    • 34547455692 scopus 로고    scopus 로고
    • Security analysis of crypto-based Java programs using automated theorem provers
    • [Jür06] S. Easterbrook and S. Uchitel, editors. ACM
    • [Jür06] J. Jürjens. Security analysis of crypto-based Java programs using automated theorem provers. In S. Easterbrook and S. Uchitel, editors, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006). ACM, 2006.
    • (2006) 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006)
    • Jürjens, J.1
  • 23
    • 33749634914 scopus 로고    scopus 로고
    • Validation of UML models via a mapping to communicating extended timed automata
    • [OGO04]
    • [OGO04] lu. Ober, S. Graf, and II. Ober. Validation of UML models via a mapping to communicating extended timed automata. In SPIN 2004, pages 127-145, 2004.
    • (2004) SPIN 2004 , pp. 127-145
    • Ober, Lu.1    Graf, S.2    Ober, Il.3
  • 24
    • 84941153056 scopus 로고    scopus 로고
    • OMG UML specification v. 1.5
    • [UML03] UML Revision Task Force. March
    • [UML03] UML Revision Task Force. OMG UML Specification v. 1.5. OMG Document formal/03-03-01. Available at http://www.omg.org/uml, March 2003.
    • (2003) OMG Document Formal/03-03-01
  • 25
    • 33749416173 scopus 로고    scopus 로고
    • [UML04] UMLsec group
    • [UML04] UMLsec group. Security analysis tool, 2004. http://www.umlsec. org.
    • (2004) Security Analysis Tool


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.