메뉴 건너뛰기




Volumn , Issue , 2006, Pages 279-286

UMLintr: A UML profile for specifying intrusions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER PROGRAMMING LANGUAGES; INTRUSION DETECTION; REDUNDANCY; SOFTWARE DESIGN; USABILITY ENGINEERING;

EID: 34250005793     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECBS.2006.70     Document Type: Conference Paper
Times cited : (35)

References (23)
  • 2
    • 0344429771 scopus 로고    scopus 로고
    • OMG Unified Modeling Language Specification
    • OMG, Technical report, Object Management Group, March
    • OMG, OMG Unified Modeling Language Specification, Technical report, Object Management Group, March 2003.
    • (2003)
  • 4
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion Detection Systems: A Survey and Taxonomy
    • Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March
    • Axelsson S., Intrusion Detection Systems: A Survey and Taxonomy, Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000.
    • (2000)
    • Axelsson, S.1
  • 5
    • 34250026474 scopus 로고    scopus 로고
    • Zulkeraine, M. and Ahamed, S., Software Security Engineering: Towards Unifying Software Engineering with Security Engineering, Chapter in M. Warkentin and R. Vaughn (editors), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, (to appear) Idea Group Publishing, 2005.
    • Zulkeraine, M. and Ahamed, S., "Software Security Engineering: Towards Unifying Software Engineering with Security Engineering", Chapter in M. Warkentin and R. Vaughn (editors), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, (to appear) Idea Group Publishing, 2005.
  • 8
    • 34250024067 scopus 로고    scopus 로고
    • OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, Technical report, Object Management Group, September
    • OMG, UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms, Technical report, Object Management Group, September 2004.
    • (2004)
  • 9
    • 84892793192 scopus 로고    scopus 로고
    • A UML Profile for the Identification and Analysis of Security Risks during Structured Brainstorming
    • Technical report, SINTEF ICT, May 2004
    • Lund, M., Braber, F., Stolen, K., and Vraalsen, F., A UML Profile for the Identification and Analysis of Security Risks during Structured Brainstorming, Technical report, SINTEF ICT, May 2004.
    • Lund, M.1    Braber, F.2    Stolen, K.3    Vraalsen, F.4
  • 10
    • 24944549262 scopus 로고    scopus 로고
    • UML Profile for Security Assessment
    • Technical report, SINTEF ICT, November 2003
    • Lund, M., Hogganvik, I., Seehusen, F., and Stolen, K., UML Profile for Security Assessment, Technical report, SINTEF ICT, November 2003.
    • Lund, M.1    Hogganvik, I.2    Seehusen, F.3    Stolen, K.4
  • 11
    • 84944220091 scopus 로고    scopus 로고
    • Towards Development of Secure Systems using UML
    • H. Hubmann, editor, Fundamental Approaches to Software Engineering FASE/ETAPS, International conference, Springer, Genova, Italy
    • Jurjens, J., "Towards Development of Secure Systems using UML", In H. Hubmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International conference), Lecture Notes in Computer Scinece, Springer, Genova, Italy, 2001.
    • (2001) Lecture Notes in Computer Scinece
    • Jurjens, J.1
  • 14
    • 79955143136 scopus 로고    scopus 로고
    • Secure UML: A UML-based Modeling Language for Model-Driven Security
    • Proceedings of the 5th International UML Conference, Springer, Dresden, Germany
    • Lodderstedt, T., Basin, D., and Doser, J., "Secure UML: A UML-based Modeling Language for Model-Driven Security", Proceedings of the 5th International UML Conference, Lecture Notes in Computer Scinece, Springer, Dresden, Germany, 2002.
    • (2002) Lecture Notes in Computer Scinece
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 15
    • 3042529796 scopus 로고    scopus 로고
    • Using UML to Reflect Non-Functional Requirements
    • Toronto, Canada
    • Cysneiros, L.M. and Leitte, J.C., "Using UML to Reflect Non-Functional Requirements", Proceedings of the GASCON 2001, Toronto, Canada, 2001.
    • (2001) Proceedings of the GASCON
    • Cysneiros, L.M.1    Leitte, J.C.2
  • 16
  • 18
    • 34249981789 scopus 로고    scopus 로고
    • Using Security Patterns to Model and Analyze Security Requirements
    • Technical Report MSU-CSE-03-18, Software Engineering and Network Systems Laboratory, Michigan State University
    • Cheng, B., Konrad, S., Cample, L., and Wassermann, R., Using Security Patterns to Model and Analyze Security Requirements, Technical Report MSU-CSE-03-18, Software Engineering and Network Systems Laboratory, Michigan State University, 2003.
    • (2003)
    • Cheng, B.1    Konrad, S.2    Cample, L.3    Wassermann, R.4
  • 21
    • 0003993827 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory
    • MIT Lincoln Laboratory, DARPA Intrusion Detection Evaluation. (http://www.ll.mit.edu/IST/ideval/), 1999.
    • (1999) DARPA Intrusion Detection Evaluation
  • 22
    • 34250014444 scopus 로고    scopus 로고
    • Eckmann, S., Vigna, G., and Kemmerer, R., STATL. Technical report, University of California Santa Barbara, CA, 2000.
    • Eckmann, S., Vigna, G., and Kemmerer, R., STATL. Technical report, University of California Santa Barbara, CA, 2000.
  • 23
    • 0004204715 scopus 로고    scopus 로고
    • A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master's Thesis
    • June
    • Kendall, K., A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master's Thesis, MIT, June 1999.
    • (1999) MIT
    • Kendall, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.