메뉴 건너뛰기




Volumn 4735 LNCS, Issue , 2007, Pages 420-435

A metamodel-based approach for analyzing security-design models

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; CONSTRAINT THEORY; DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA; UNIFIED MODELING LANGUAGE;

EID: 38049059202     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75209-7_29     Document Type: Conference Paper
Times cited : (14)

References (14)
  • 2
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006)
    • (2006) ACM Trans. Softw. Eng. Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.A.1    Doser, J.2    Lodderstedt, T.3
  • 3
    • 38049083290 scopus 로고    scopus 로고
    • Boulton, R.J., Gordon, A., Gordon, M.J.C., Harrison, J., Herbert, J., Van Tassel, J.: Experience with Embedding Hardware Description Languages in HOL. In: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, pp. 129-156. North-Holland, Amsterdam (1992)
    • Boulton, R.J., Gordon, A., Gordon, M.J.C., Harrison, J., Herbert, J., Van Tassel, J.: Experience with Embedding Hardware Description Languages in HOL. In: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, pp. 129-156. North-Holland, Amsterdam (1992)
  • 4
    • 33646165236 scopus 로고    scopus 로고
    • Using OCL to formalize object oriented metrics definitions
    • Technical Report ES007/2001, FCT/UNL and INESC, Portugal June, available at
    • Brito e Abreu, F.: Using OCL to formalize object oriented metrics definitions. Technical Report ES007/2001, FCT/UNL and INESC, Portugal (June 2001), available at http ://ctp.di.fct.unl.pt/QUASAR/Resources/Papers/others/ MOOD.OCL.pdf
    • (2001)
    • Brito1    Abreu, F.2
  • 7
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Hussmann, H, ed, ETAPS 2001 and FASE 2001, Springer, Heidelberg
    • Jürjens, J.: Towards development of secure systems using UMLsec. In: Hussmann, H. (ed.) ETAPS 2001 and FASE 2001. LNCS, vol. 2029, pp. 187-200. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2029 , pp. 187-200
    • Jürjens, J.1
  • 8
    • 79955163100 scopus 로고    scopus 로고
    • Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 412-425. Springer, Heidelberg (2002)
    • Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
  • 10
    • 79955143136 scopus 로고    scopus 로고
    • Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, pp. 426-441. Springer, Heidelberg (2002)
    • Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
  • 12
    • 33646027053 scopus 로고    scopus 로고
    • Sohr, K., Ahn, G.J., Gogolla, M., Migge, L.: Specification and validation of authorisation constraints using UML and OCL. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 64-79. Springer, Heidelberg (2005)
    • Sohr, K., Ahn, G.J., Gogolla, M., Migge, L.: Specification and validation of authorisation constraints using UML and OCL. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 64-79. Springer, Heidelberg (2005)
  • 13
    • 35048840185 scopus 로고    scopus 로고
    • Wang, H., Zhang, Y., Cao, J., Yang, J.: Specifying Role-Based Access Constraints with Object Constraint Language. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, 3007, pp. 687-696. Springer, Heidelberg (2004)
    • Wang, H., Zhang, Y., Cao, J., Yang, J.: Specifying Role-Based Access Constraints with Object Constraint Language. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, vol. 3007, pp. 687-696. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.