-
4
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
August
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3), August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
5
-
-
5744230994
-
An Aspect-Oriented Approach to Design Modeling
-
August
-
R. France, I. Ray, G. Georg, and S. Ghosh. An Aspect-Oriented Approach to Design Modeling. IEE Proceedings - Software, Special Issue on Early Aspects: Aspect Oriented Requirements Engineering and Architecture Design, 151(4):173-185, August 2004.
-
(2004)
IEE Proceedings - Software, Special Issue on Early Aspects: Aspect Oriented Requirements Engineering and Architecture Design
, vol.151
, Issue.4
, pp. 173-185
-
-
France, R.1
Ray, I.2
Georg, G.3
Ghosh, S.4
-
7
-
-
0016984825
-
Protection in Operating Systems
-
August
-
M.H. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in Operating Systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
10
-
-
34247549265
-
Evaluation of Pattern Conformance
-
Technical Report CSE-05-TR-0501, CSE Department, Oakland University, Rochester, MI, March
-
D. Kim. Evaluation of Pattern Conformance. Technical Report CSE-05-TR-0501, CSE Department, Oakland University, Rochester, MI, March 2005.
-
(2005)
-
-
Kim, D.1
-
11
-
-
0345566461
-
-
D. Kim, R. France, S. Ghosh, and E. Song. A Role-Based Metamodeling Approach to Specifying Design Patterns. In Proceedings of the 27th IEEE Annual International Computer Software and Applications Conference COMPSAC, pages 452-457, Dallas, USA, 2003. IEEE Computer Society Press
-
D. Kim, R. France, S. Ghosh, and E. Song. A Role-Based Metamodeling Approach to Specifying Design Patterns. In Proceedings of the 27th IEEE Annual International Computer Software and Applications Conference (COMPSAC), pages 452-457, Dallas, USA, 2003. IEEE Computer Society Press.
-
-
-
-
12
-
-
30644461712
-
Modeling Role-Based Access Control Using Parameterized UML Models
-
Barcelona, Spain
-
D. Kim, I. Ray, R. France, and N. Li. Modeling Role-Based Access Control Using Parameterized UML Models. In Proceedings of Fundamental Approaches to Software Engineering, Barcelona, Spain, 2004.
-
(2004)
Proceedings of Fundamental Approaches to Software Engineering
-
-
Kim, D.1
Ray, I.2
France, R.3
Li, N.4
-
13
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Dresden, Germany
-
T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In Proceedings of the 5th International Conference on the Unified Modeling Language, pages 426-441, Dresden, Germany, 2002.
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
14
-
-
77954720255
-
A Taxonomy of Model Transformations
-
Wadern, Germany
-
T. Mens, K. Czarnecki, and P. Van Gorp. A Taxonomy of Model Transformations. In Online Proceedings of the Dagstuhl Seminar 04101 on Language Engineering for Model-Driven Software Development, Schloss Dagstuhl, Wadern, Germany, 2004.
-
(2004)
Online Proceedings of the Dagstuhl Seminar 04101 on Language Engineering for Model-Driven Software Development, Schloss Dagstuhl
-
-
Mens, T.1
Czarnecki, K.2
Van Gorp, P.3
-
17
-
-
84892902868
-
A Pattern System for Access Control
-
Sitges, Spain
-
T. Priebe, E.B. Fernandez, J.I. Mehlau, and G. Pernul. A Pattern System for Access Control. In Proceedings of 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Sitges, Spain, 2004.
-
(2004)
Proceedings of 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security
-
-
Priebe, T.1
Fernandez, E.B.2
Mehlau, J.I.3
Pernul, G.4
-
18
-
-
85087599701
-
Using Parameterized UML to Specify and Compose Access Control Models
-
Lausanne, Switzerland
-
I. Ray, N. Li, D. Kim, and R. France. Using Parameterized UML to Specify and Compose Access Control Models. In Proceedings of the 6th IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, Switzerland, 2003.
-
(2003)
Proceedings of the 6th IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS)
-
-
Ray, I.1
Li, N.2
Kim, D.3
France, R.4
-
19
-
-
0028513932
-
Access Control: Principles and Practice
-
September
-
R. Sandhu and P. Samarati. Access Control: Principles and Practice. IEEE Communications, 32(9):40-48, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
20
-
-
0034497420
-
Eliciting Security Requirements by Misuse Cases
-
IEEE CS Press
-
G. Sindre and A. Opdahl. Eliciting Security Requirements by Misuse Cases. In IEEE TOOLS-37, pages 120-131. IEEE CS Press, 2000.
-
(2000)
IEEE TOOLS-37
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.2
-
21
-
-
34247495560
-
-
The Object Management Group OMG, Unified Modeling Language: Superstructure. Version 2.0 Formal/05-07-04, OMG, August 2005
-
The Object Management Group (OMG). Unified Modeling Language: Superstructure. Version 2.0 Formal/05-07-04, OMG, http://www.omg.org, August 2005.
-
-
-
|