메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1074-1081

A novel approach to building secure systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA STRUCTURES; ELECTRONIC COMMERCE; PROBLEM SOLVING; TEMPLATE MATCHING;

EID: 34548178043     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.11     Document Type: Conference Paper
Times cited : (3)

References (16)
  • 3
    • 79955159194 scopus 로고    scopus 로고
    • David Akehurst and Stuart Kent, A relational approach to defining transformations in a metamodel. In UML, 2002 - The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools, 5th International Conference, Dresden, Germany, September/October 2002, Proceedings, 2460 of LNCS, Springer Verlag, 2002., pp 243-258
    • David Akehurst and Stuart Kent, "A relational approach to defining transformations in a metamodel. In UML", 2002 - "The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools", 5th International Conference, Dresden, Germany, September/October 2002, Proceedings, volume 2460 of LNCS, Springer Verlag, 2002., pp 243-258
  • 4
    • 84970018149 scopus 로고    scopus 로고
    • Design Authorization Systems Using SecureUML
    • February
    • Rudolph Ara-jo & Shanit Gupta. "Design Authorization Systems Using SecureUML", Foundstone Professional Services, February 2005., pp 2-16
    • (2005) Foundstone Professional Services , pp. 2-16
    • Ara-jo, R.1    Gupta, S.2
  • 6
    • 34548162375 scopus 로고    scopus 로고
    • School of Computing, Staffordshire University, Stafford
    • William Fone & Peter Gregory,. "Web Page Defacement Countermeasures", School of Computing, Staffordshire University, Stafford, 2003., pp 1-4
    • (2003) Web Page Defacement Countermeasures , pp. 1-4
    • Fone, W.1    Gregory, P.2
  • 7
    • 34548149956 scopus 로고    scopus 로고
    • Common Web Application Attack Types and Security Using ASP.NET
    • December
    • Jovicie, B. and Simic D., "Common Web Application Attack Types and Security Using ASP.NET", Com SIS, Vol 3, Number 2, December 2006., pp 83-96
    • (2006) Com SIS , vol.3 , Issue.2 , pp. 83-96
    • Jovicie, B.1    Simic, D.2
  • 8
    • 84944220091 scopus 로고    scopus 로고
    • Jan J'urjens, Towards development of secure systems using UMLsec, In Heinrich Hussmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS 2001), number 2029 in LNCS, Springer-Verlag, 2001., pp 187-200.
    • Jan J'urjens, "Towards development of secure systems using UMLsec", In Heinrich Hussmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS 2001), number 2029 in LNCS, Springer-Verlag, 2001., pp 187-200.
  • 9
    • 26844531710 scopus 로고    scopus 로고
    • Model Driven Security: From UML Models to Access Control Architectures
    • PhD Thesis, University of Freiburg, Germany
    • Torsten Lodderstedt, "Model Driven Security: from UML Models to Access Control Architectures", PhD Thesis, University of Freiburg, Germany, 2003.
    • (2003)
    • Lodderstedt, T.1
  • 10
    • 34548169620 scopus 로고    scopus 로고
    • Web Application Security Engineering
    • july/avgust
    • J. D. Meier Web Application Security Engineering, IEEE Computer Society, july/avgust, 2006., pp 3-19
    • (2006) IEEE Computer Society , pp. 3-19
    • Meier, J.D.1
  • 13
    • 34548171697 scopus 로고    scopus 로고
    • Holistic Approach to WEP protocol in Secure Wireless Network Infrastructure
    • December
    • R. Prodanovic and D. Simic, "Holistic Approach to WEP protocol in Secure Wireless Network Infrastructure", ComSIS, Vol 3, December 2006., pp 97-113,
    • (2006) ComSIS , vol.3 , pp. 97-113
    • Prodanovic, R.1    Simic, D.2
  • 16
    • 34548191026 scopus 로고    scopus 로고
    • Analysis and implementation of asymmetric algorithms for data secrecy and integrity protection
    • Master Thesis, Faculty of Electrical Engineering, Belgrade
    • D. Vidakovic, "Analysis and implementation of asymmetric algorithms for data secrecy and integrity protection", Master Thesis, Faculty of Electrical Engineering, Belgrade 1999., pp 89-91
    • (1999) , pp. 89-91
    • Vidakovic, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.