-
1
-
-
0001429450
-
New age of software development: how component-based software engineering changes the way of software development
-
IEEE Computer Society Press, Kyoto, Japan
-
Aoyama M. New age of software development: how component-based software engineering changes the way of software development. Proceedings of International Workshop on Component-Based Software Engineering (1998), IEEE Computer Society Press, Kyoto, Japan
-
(1998)
Proceedings of International Workshop on Component-Based Software Engineering
-
-
Aoyama, M.1
-
2
-
-
33847646152
-
-
ArgoUML, 2006. Available from: , accessed in January 2006.
-
-
-
-
3
-
-
33847651192
-
Component-based software development for embedded systems - an introduction
-
Component-Based Software Development for Embedded Systems. Atkinson C., Bunse C., Gross H., and Peper C. (Eds), Springer-Verlag
-
Atkinson C., Bunse C., Peper C., and Gross H. Component-based software development for embedded systems - an introduction. In: Atkinson C., Bunse C., Gross H., and Peper C. (Eds). Component-Based Software Development for Embedded Systems. Lecture Notes in Computer Science Vol. 3778 (2005), Springer-Verlag 1-7
-
(2005)
Lecture Notes in Computer Science
, vol.3778
, pp. 1-7
-
-
Atkinson, C.1
Bunse, C.2
Peper, C.3
Gross, H.4
-
4
-
-
33847618645
-
-
Bond, A., Pahlsson, N., 2004. A Quantitative Evaluation Framework for Component Security in Distributed Information Systems, Undergraduate thesis Y-level (Information Theory), Linkopings University, Linkopings, Sweden.
-
-
-
-
5
-
-
0032163727
-
The current state of CBSE
-
Brown A., and Wallnau K. The current state of CBSE. IEEE Software 15 5 (1997) 37-46
-
(1997)
IEEE Software
, vol.15
, Issue.5
, pp. 37-46
-
-
Brown, A.1
Wallnau, K.2
-
6
-
-
33847630314
-
-
Brucker, A., Wolff, B., 2001. Testing distributed component based systems using UML/OCL, In Informatik 2001. Tagungsband der GI/ÖCG Jahrestagung, 1 (157).
-
-
-
-
7
-
-
33847640864
-
-
Common Criteria, 1999. Common Criteria for Information Technology Evaluation, Part 1: Introduction and General Model, Technical Report, (CCIMB-99-031), Version 2.1, Common Criteria, USA.
-
-
-
-
8
-
-
33847612295
-
-
Common Criteria, 1999. Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Requirements, (CCIMB-99-032), Version 2.1, Common Criteria, USA.
-
-
-
-
9
-
-
0005254250
-
-
Artech House Inc., Norwood, MA, USA 5-9
-
Crnkovic I., and Larsson M. Building Reliable Component-Based Software Systems (2002), Artech House Inc., Norwood, MA, USA 5-9
-
(2002)
Building Reliable Component-Based Software Systems
-
-
Crnkovic, I.1
Larsson, M.2
-
10
-
-
33847678850
-
-
DARPA, 1999. DARPA Intrusion Detection Evaluation at MIT Lincoln Laboratory, Available from: , accessed in January 2006.
-
-
-
-
11
-
-
10044261258
-
-
Gousios, G., Aivaloglou, E., Gritzallis S., 2005. Distributed component architectures security issues, Computer Standards and Interfaces, Elsevier Science Inc., New York, USA, 27 (3), 269-284.
-
-
-
-
12
-
-
0033717626
-
Distributed component software security issues on deploying a secure electronic marketplace
-
Gritzalis S., Iliadis J., and Oikonomopoulos S. Distributed component software security issues on deploying a secure electronic marketplace. Information Management and Computer Security, Emerald, West Yorkshire, England 8 1 (2000) 5-13
-
(2000)
Information Management and Computer Security, Emerald, West Yorkshire, England
, vol.8
, Issue.1
, pp. 5-13
-
-
Gritzalis, S.1
Iliadis, J.2
Oikonomopoulos, S.3
-
13
-
-
0034872904
-
Trust-adapted enforcement of security policies in distributed component-structured applications
-
IEEE Computer Society Press, Washington, USA
-
Herrmann P., and Krumm H. Trust-adapted enforcement of security policies in distributed component-structured applications. Proceedings of the sixth IEEE Symposium on Computers and Communications (2001), IEEE Computer Society Press, Washington, USA 2-8
-
(2001)
Proceedings of the sixth IEEE Symposium on Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
14
-
-
34250005793
-
-
Hussein, M., Zulkernine, M., 2006. UMLintr: a UML profile for specifying intrusions, In: Proceedings of the 13th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, IEEE Computer Society Press, Potsdam, Germany, 279-286.
-
-
-
-
16
-
-
33847643979
-
Component-Based Development of Dependable Systems with UML
-
Component-Based Software Development for Embedded Systems. Atkinson C., Bunse C., Gross H., and Peper C. (Eds), Springer-Verlag
-
Jurjens J., and Wagner S. Component-Based Development of Dependable Systems with UML. In: Atkinson C., Bunse C., Gross H., and Peper C. (Eds). Component-Based Software Development for Embedded Systems. Lecture Notes in Computer Science vol. 3778 (2005), Springer-Verlag 320-344
-
(2005)
Lecture Notes in Computer Science
, vol.3778
, pp. 320-344
-
-
Jurjens, J.1
Wagner, S.2
-
17
-
-
33847659922
-
-
Kendall, K., 1999. A Database of Computer Attacks for the Evaluation of Intrusion Intrusion Detection Systems, M.Sc. Thesis, MIT, USA.
-
-
-
-
18
-
-
0344235406
-
A security characterisation framework for trustworthy component-based software systems
-
IEEE Computer Society Press, Washington, DC, USA
-
Khan K., and Han J. A security characterisation framework for trustworthy component-based software systems. Proceedings of the 27th Annual International Conference on Computer Software and Applications (2003), IEEE Computer Society Press, Washington, DC, USA 164-169
-
(2003)
Proceedings of the 27th Annual International Conference on Computer Software and Applications
, pp. 164-169
-
-
Khan, K.1
Han, J.2
-
19
-
-
33646546963
-
Deriving systems level security properties of component-based composite systems
-
IEEE Computer Society Press, Brisbane, Australia
-
Khan K., and Han J. Deriving systems level security properties of component-based composite systems. Proceedings of the Australian Conference on Software Engineering (2005), IEEE Computer Society Press, Brisbane, Australia 334-343
-
(2005)
Proceedings of the Australian Conference on Software Engineering
, pp. 334-343
-
-
Khan, K.1
Han, J.2
-
20
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
-
IEEE Computer Society Press, Oakland, CA, USA
-
Ko C., Ruschitzka M., and Levitt K. Execution monitoring of security-critical programs in distributed systems: a specification-based approach. IEEE Symposium on Security and Privacy (1997), IEEE Computer Society Press, Oakland, CA, USA 175-187
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
21
-
-
3242756924
-
Embedded systems security
-
Koopman P. Embedded systems security. IEEE Computer 37 7 (2004) 95-97
-
(2004)
IEEE Computer
, vol.37
, Issue.7
, pp. 95-97
-
-
Koopman, P.1
-
22
-
-
33847630313
-
-
Korba, J., 2000. Windows NT Attacks for the Evaluation of Intrusion Detection Systems, M.Sc. Thesis, MIT, USA.
-
-
-
-
23
-
-
33847643545
-
-
Lund, M., Hogganvik, I., Seehusen, F., Stolen, K., 2003. UML Profile for Security Assessment, Technical Report, SINTEF ICT, Norway.
-
-
-
-
24
-
-
33847673891
-
-
Mingins, C., Chan, C., 2002. Building trust in third-party components using component wrappers in the .NET frameworks, In: Proceedings of the Fortieth International Conference on Tools Pacific, ACM International Conference Proceeding Series, Sydney, Australia, 153-157.
-
-
-
-
25
-
-
33847628677
-
-
Object Management Group, 2004. UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, Technical Report, Object Management Group, Needham, MA, USA.
-
-
-
-
26
-
-
33847611419
-
-
Object Management Group, 2005. Unified Modeling Language: Superstructure, Technical Report, Object Management Group, Needham, MA, USA.
-
-
-
-
28
-
-
33847684175
-
-
Rits, M., 2003. Component Adaptability and Security, M.Sc. Thesis, University of Nice Sophia-Antipolis, France.
-
-
-
-
29
-
-
0038011179
-
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S., 2002. Specification-based anomaly detection: a new approach for detecting network intrusions, In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington DC, USA, 265-274.
-
-
-
-
30
-
-
33847654566
-
-
Selic, B., Rumbaugh, J., 1998. Using UML for Modeling Complex Real-Time Systems, Technical Report, ObjecTime Limited, Canada.
-
-
-
-
32
-
-
84947547225
-
-
Uppuluri, P., Sekar, R., 2001. Experiences with specification-based intrusion detection. In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection. Springer-Verlag, 2212, 172-189.
-
-
-
-
33
-
-
33847686629
-
-
Vankamamidi, R., 2001. ASL: A Specification Language for Intrusion Detection and Network Monitoring, M.Sc. Thesis, Iowa State University, Iowa, USA.
-
-
-
-
34
-
-
33847618187
-
-
Vigna, G., Eckmann, S.T., Kemmerer, R.A., 2000. Attack languages, In: Proceedings of the IEEE Information Survivability Workshop, IEEE Computer Society Press, Boston, MA, USA, 163-166.
-
-
-
-
35
-
-
33845206869
-
Software security engineering: towards unifying software engineering with security engineering
-
Warkentin M., and Vaughn R. (Eds), Idea Group Publishing
-
Zulkernine M., and Ahamed S. Software security engineering: towards unifying software engineering with security engineering. In: Warkentin M., and Vaughn R. (Eds). Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (2006), Idea Group Publishing 215-233
-
(2006)
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
, pp. 215-233
-
-
Zulkernine, M.1
Ahamed, S.2
-
36
-
-
4944256309
-
Towards automatic monitoring of component-based software systems
-
Zulkernine M., and Seviora R. Towards automatic monitoring of component-based software systems. Journal of Systems and Software 74 1 (2005) 15-24
-
(2005)
Journal of Systems and Software
, vol.74
, Issue.1
, pp. 15-24
-
-
Zulkernine, M.1
Seviora, R.2
|