-
3
-
-
79955159194
-
-
David Akehurst and Stuart Kent, A relational approach to defining transformations in a metamodel. In UML, 2002 - The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools, 5th International Conference, Dresden, Germany, September/October 2002, Proceedings, 2460 of LNCS, Springer Verlag, 2002., pp 243-258
-
David Akehurst and Stuart Kent, "A relational approach to defining transformations in a metamodel. In UML", 2002 - "The Unified Modeling Language. Model Engineering, Languages, Concepts, and Tools", 5th International Conference, Dresden, Germany, September/October 2002, Proceedings, volume 2460 of LNCS, Springer Verlag, 2002., pp 243-258
-
-
-
-
4
-
-
84970018149
-
Design Authorization Systems Using SecureUML
-
February
-
Rudolph Ara-jo & Shanit Gupta. "Design Authorization Systems Using SecureUML", Foundstone Professional Services, February 2005., pp 2-16
-
(2005)
Foundstone Professional Services
, pp. 2-16
-
-
Ara-jo, R.1
Gupta, S.2
-
5
-
-
34548183544
-
Model Driven Security: From UML Models to Access Control Infrastructures
-
September
-
D. Basin, J. Doser, and T. Lodderstedt,."Model Driven Security: from UML Models to Access Control Infrastructures", Interactive Objects Software GmbH Freiburg, September 2005., pp 1-23
-
(2005)
Interactive Objects Software GmbH Freiburg
, pp. 1-23
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
6
-
-
34548162375
-
-
School of Computing, Staffordshire University, Stafford
-
William Fone & Peter Gregory,. "Web Page Defacement Countermeasures", School of Computing, Staffordshire University, Stafford, 2003., pp 1-4
-
(2003)
Web Page Defacement Countermeasures
, pp. 1-4
-
-
Fone, W.1
Gregory, P.2
-
7
-
-
34548149956
-
Common Web Application Attack Types and Security Using ASP.NET
-
December
-
Jovicie, B. and Simic D., "Common Web Application Attack Types and Security Using ASP.NET", Com SIS, Vol 3, Number 2, December 2006., pp 83-96
-
(2006)
Com SIS
, vol.3
, Issue.2
, pp. 83-96
-
-
Jovicie, B.1
Simic, D.2
-
8
-
-
84944220091
-
-
Jan J'urjens, Towards development of secure systems using UMLsec, In Heinrich Hussmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS 2001), number 2029 in LNCS, Springer-Verlag, 2001., pp 187-200.
-
Jan J'urjens, "Towards development of secure systems using UMLsec", In Heinrich Hussmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS 2001), number 2029 in LNCS, Springer-Verlag, 2001., pp 187-200.
-
-
-
-
9
-
-
26844531710
-
Model Driven Security: From UML Models to Access Control Architectures
-
PhD Thesis, University of Freiburg, Germany
-
Torsten Lodderstedt, "Model Driven Security: from UML Models to Access Control Architectures", PhD Thesis, University of Freiburg, Germany, 2003.
-
(2003)
-
-
Lodderstedt, T.1
-
10
-
-
34548169620
-
Web Application Security Engineering
-
july/avgust
-
J. D. Meier Web Application Security Engineering, IEEE Computer Society, july/avgust, 2006., pp 3-19
-
(2006)
IEEE Computer Society
, pp. 3-19
-
-
Meier, J.D.1
-
11
-
-
0004192381
-
-
CRC Press, New York
-
A. Menezes, P.C. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997., pp 425-486
-
(1997)
Handbook of Applied Cryptography
, pp. 425-486
-
-
Menezes, A.1
van Oorschot, P.C.2
Vanstone, S.3
-
13
-
-
34548171697
-
Holistic Approach to WEP protocol in Secure Wireless Network Infrastructure
-
December
-
R. Prodanovic and D. Simic, "Holistic Approach to WEP protocol in Secure Wireless Network Infrastructure", ComSIS, Vol 3, December 2006., pp 97-113,
-
(2006)
ComSIS
, vol.3
, pp. 97-113
-
-
Prodanovic, R.1
Simic, D.2
-
14
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. "Role-based access control models". IEEE Compute 29(2), 1996., pp 38-47
-
(1996)
IEEE Compute
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
34548191026
-
Analysis and implementation of asymmetric algorithms for data secrecy and integrity protection
-
Master Thesis, Faculty of Electrical Engineering, Belgrade
-
D. Vidakovic, "Analysis and implementation of asymmetric algorithms for data secrecy and integrity protection", Master Thesis, Faculty of Electrical Engineering, Belgrade 1999., pp 89-91
-
(1999)
, pp. 89-91
-
-
Vidakovic, D.1
|