-
1
-
-
84950281940
-
Role-based authorization constraints specification using Object Constraint Language
-
IEEE Computer Society, Washington, DC, USA
-
Ahn, G.J., Shin, M.E.: Role-based authorization constraints specification using Object Constraint Language. In: WETICE '01. Proceedings of the 10th IEEE International Workshops on Enabling Technologies, pp. 157-162. IEEE Computer Society, Washington, DC, USA (2001)
-
(2001)
WETICE '01. Proceedings of the 10th IEEE International Workshops on Enabling Technologies
, pp. 157-162
-
-
Ahn, G.J.1
Shin, M.E.2
-
2
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006)
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
38049083290
-
-
Boulton, R.J., Gordon, A., Gordon, M.J.C., Harrison, J., Herbert, J., Van Tassel, J.: Experience with Embedding Hardware Description Languages in HOL. In: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, pp. 129-156. North-Holland, Amsterdam (1992)
-
Boulton, R.J., Gordon, A., Gordon, M.J.C., Harrison, J., Herbert, J., Van Tassel, J.: Experience with Embedding Hardware Description Languages in HOL. In: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, pp. 129-156. North-Holland, Amsterdam (1992)
-
-
-
-
4
-
-
33646165236
-
Using OCL to formalize object oriented metrics definitions
-
Technical Report ES007/2001, FCT/UNL and INESC, Portugal June, available at
-
Brito e Abreu, F.: Using OCL to formalize object oriented metrics definitions. Technical Report ES007/2001, FCT/UNL and INESC, Portugal (June 2001), available at http ://ctp.di.fct.unl.pt/QUASAR/Resources/Papers/others/ MOOD.OCL.pdf
-
(2001)
-
-
Brito1
Abreu, F.2
-
5
-
-
84992227458
-
Proposed NIST standard for Role-Based Access Control
-
Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for Role-Based Access Control. ACM Trans. Inf. Syst. Secur. 4(3), 224-274 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
6
-
-
45849114537
-
Using aspects to design a secure system
-
IEEE Computer Society Press, Washington, DC, USA
-
Georg, G., Ray, I., France, R.: Using aspects to design a secure system. In: ICECCS '02. Proceedings of the Eighth International Conference on Engineering of Complex Computer Systems, pp. 117-126. IEEE Computer Society Press, Washington, DC, USA (2002)
-
(2002)
ICECCS '02. Proceedings of the Eighth International Conference on Engineering of Complex Computer Systems
, pp. 117-126
-
-
Georg, G.1
Ray, I.2
France, R.3
-
7
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
Hussmann, H, ed, ETAPS 2001 and FASE 2001, Springer, Heidelberg
-
Jürjens, J.: Towards development of secure systems using UMLsec. In: Hussmann, H. (ed.) ETAPS 2001 and FASE 2001. LNCS, vol. 2029, pp. 187-200. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
8
-
-
79955163100
-
-
Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 412-425. Springer, Heidelberg (2002)
-
Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
-
-
-
-
9
-
-
0344990694
-
-
Addison-Wesley, Reading
-
Kleppe, A., Bast, W., Warmer, J.B., Watson, A.: MDA Explained: The Model Driven Architecture-Practice and Promise. Addison-Wesley, Reading (2003)
-
(2003)
MDA Explained: The Model Driven Architecture-Practice and Promise
-
-
Kleppe, A.1
Bast, W.2
Warmer, J.B.3
Watson, A.4
-
10
-
-
79955143136
-
-
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
-
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
-
-
-
12
-
-
33646027053
-
-
Sohr, K., Ahn, G.J., Gogolla, M., Migge, L.: Specification and validation of authorisation constraints using UML and OCL. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 64-79. Springer, Heidelberg (2005)
-
Sohr, K., Ahn, G.J., Gogolla, M., Migge, L.: Specification and validation of authorisation constraints using UML and OCL. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 64-79. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
35048840185
-
-
Wang, H., Zhang, Y., Cao, J., Yang, J.: Specifying Role-Based Access Constraints with Object Constraint Language. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, 3007, pp. 687-696. Springer, Heidelberg (2004)
-
Wang, H., Zhang, Y., Cao, J., Yang, J.: Specifying Role-Based Access Constraints with Object Constraint Language. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, vol. 3007, pp. 687-696. Springer, Heidelberg (2004)
-
-
-
|