-
1
-
-
67650243926
-
Model-driven security for Web services (MDS4WS)
-
M. Alam, M. Hafner and R. Breu, Model-driven security for Web services (MDS4WS), in: INMIC 2004.
-
INMIC 2004
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
3
-
-
33750037935
-
A framework for modeling restricted delegation in service oriented architecture
-
M. Alam, M. Hafner, R. Breu and S. Unterthiner, A framework for modeling restricted delegation in service oriented architecture, in: TrustBus, 2006, pp. 142-151.
-
(2006)
TrustBus
, pp. 142-151
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
Unterthiner, S.4
-
4
-
-
85036965135
-
-
available at
-
AndroMDA v3.0M3 available at. http://andromda.org/.
-
AndroMDA v3.0M3
-
-
-
5
-
-
33344463375
-
Developing applications using model-driven design environments
-
K. Balasubramanian, A. Gokhale, G. Karsai, J. Sztipanovits and S. Neema, Developing applications using model-driven design environments, Computer 39(2) (2006), 33.
-
(2006)
Computer
, vol.39
, Issue.2
, pp. 33
-
-
Balasubramanian, K.1
Gokhale, A.2
Karsai, G.3
Sztipanovits, J.4
Neema, S.5
-
6
-
-
38349131504
-
The z specification language and the proof environment isabelle/hol-z (in Japanese)
-
D. Basin, H. Kuruma, S. Nakajima and B. Wolff, The z specification language and the proof environment isabelle/hol-z (in Japanese), Computer Software - Journal of the Japanese Society for Software Science and Technology 24 (2007), 21-26.
-
(2007)
Computer Software - Journal of the Japanese Society for Software Science and Technology
, vol.24
, pp. 21-26
-
-
Basin, D.1
Kuruma, H.2
Nakajima, S.3
Wolff, B.4
-
7
-
-
33746435793
-
-
S. Brahe and K. Østerbye, Business process modeling: Defining domain specific modeling languages by use of uml profiles, in: ECMDA-FA, 2006, pp. 241-255.
-
S. Brahe and K. Østerbye, Business process modeling: Defining domain specific modeling languages by use of uml profiles, in: ECMDA-FA, 2006, pp. 241-255.
-
-
-
-
8
-
-
26444432193
-
Web service engineering - advancing a new software engineering discipline
-
R. Breu, M. Breu, M. Hafner and A. Nowak, Web service engineering - advancing a new software engineering discipline, in: ICWE, 2005, pp. 8-18.
-
(2005)
ICWE
, pp. 8-18
-
-
Breu, R.1
Breu, M.2
Hafner, M.3
Nowak, A.4
-
9
-
-
26844470176
-
Model driven security for inter-organizational workflows in. e-government
-
R. Breu, M. Hafner, B. Weber and A. Nowak, Model driven security for inter-organizational workflows in. e-government, in: TCGOV, 2005, pp. 122-133.
-
(2005)
TCGOV
, pp. 122-133
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
Nowak, A.4
-
10
-
-
35048860896
-
Actor-centric modeling of user rights
-
R. Breu and G. Popp, Actor-centric modeling of user rights, in: FASE, 2004, pp. 165-179.
-
(2004)
FASE
, pp. 165-179
-
-
Breu, R.1
Popp, G.2
-
11
-
-
26844566257
-
A flexible role-based delegation model using characteristics of permissions, DEXA 2005
-
D. Gue Park et al., A flexible role-based delegation model using characteristics of permissions, DEXA 2005, LNCS, Vol. 3588, 2005, pp. 310-323.
-
(2005)
LNCS
, vol.3588
, pp. 310-323
-
-
Gue Park, D.1
-
13
-
-
33750315310
-
Towards a mof/qvt-based domain architecture for model driven security
-
M. Hafner, M. Alam and R. Breu, Towards a mof/qvt-based domain architecture for model driven security, in: MoDELS, 2006, pp. 275-290.
-
(2006)
MoDELS
, pp. 275-290
-
-
Hafner, M.1
Alam, M.2
Breu, R.3
-
14
-
-
33749063417
-
Modelling inter-organizational workflow security in a peer-to-peer environment
-
Washington, DC, USA, IEEE Computer Society
-
M. Hafner, M. Breu, R. Breu and A. Nowak, Modelling inter-organizational workflow security in a peer-to-peer environment, in: ICWS'05: Proceedings of the IEEE International Conference on Web Services (ICWS'05), Washington, DC, USA, IEEE Computer Society, 2005, pp. 533-540.
-
(2005)
ICWS'05: Proceedings of the IEEE International Conference on Web Services (ICWS'05)
, pp. 533-540
-
-
Hafner, M.1
Breu, M.2
Breu, R.3
Nowak, A.4
-
15
-
-
85037001945
-
-
http://www.eclipse.org/emf/.
-
-
-
-
18
-
-
85036982380
-
-
http://hissa.nist.gov/rbac/paper/node5.html.
-
-
-
-
19
-
-
0142152900
-
A new role-based delegation model using sub-role hierarchies
-
H. Lee, Y. Lee and B. Noh, A new role-based delegation model using sub-role hierarchies, in: ISCIS, 2003, pp. 811-818.
-
(2003)
ISCIS
, pp. 811-818
-
-
Lee, H.1
Lee, Y.2
Noh, B.3
-
20
-
-
79955143136
-
Secureuml: A UML-based modeling language for model-driven security
-
UML, The Unified Modeling Language, 5th International Conference, Dresden, Germany, 2002, J.-M. Jézéquel, H. Hussmann and S. Cook, eds, Springer-Verlag
-
T. Lodderstedt, D.A. Basin and J. Doser, Secureuml: A UML-based modeling language for model-driven security, in: UML - The Unified Modeling Language, 5th International Conference, Dresden, Germany, 2002, J.-M. Jézéquel, H. Hussmann and S. Cook, eds, LNCS, Vol. 2460, Springer-Verlag, 2002, pp. 426-441.
-
(2002)
LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
21
-
-
85036997646
-
-
http://www.magicdraw.com/.
-
-
-
-
22
-
-
0004043233
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
D. Marco, Building and Managing the Meta Data Repository: A Full Life-Cycle Guide, John Wiley & Sons, Inc., New York, NY, USA, 2000.
-
(2000)
Building and Managing the Meta Data Repository: A Full Life-Cycle Guide
-
-
Marco, D.1
-
23
-
-
38149075083
-
Model-driven security engineering for the realization of dynamic security requirements in collaborative systems
-
PhD Symposium of IEEE/ACM Models 2006, Genoa, Italy
-
M. Alam, Model-driven security engineering for the realization of dynamic security requirements in collaborative systems, in: PhD Symposium of IEEE/ACM Models 2006, Genoa, Italy, LNCS, Vol. 4364, 2006, pp. 278-287.
-
(2006)
LNCS
, vol.4364
, pp. 278-287
-
-
Alam, M.1
-
24
-
-
33750940982
-
Modeling permissions in a (U/X)ML World
-
IEE Computer Society, Washington, DC, ISBN: 0-7695-2567-9
-
M. Alam, R. Breu and M. Hafner, Modeling permissions in a (U/X)ML World, in: ARES 2006, IEE Computer Society, Washington, DC, 2006, pp. 685-692. ISBN: 0-7695-2567-9.
-
(2006)
ARES 2006
, pp. 685-692
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
27
-
-
33750453781
-
SECTET - An extensible framework for the realization of secure inter-organizational workflows
-
M. Hafner, R. Breu, B. Agreiter and A. Nowak, SECTET - An extensible framework for the realization of secure inter-organizational workflows, Journal of Internet Research 24 (2006), 491-506.
-
(2006)
Journal of Internet Research
, vol.24
, pp. 491-506
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
28
-
-
38349165472
-
A Security architecture for inter-organizational workflows: Putting WS security standards together
-
27-28 May, Miami, USA, INSTICC, pp, ISBN: 972-8865-19-8
-
M. Hafner, R. Breu and M. Breu, A Security architecture for inter-organizational workflows: Putting WS security standards together, in: Proc. 7th International Conference on Enterprise Information Systems (ICEIS 2005), 27-28 May 2005, Miami, USA, INSTICC, pp. 128-135. ISBN: 972-8865-19-8.
-
(2005)
Proc. 7th International Conference on Enterprise Information Systems (ICEIS 2005)
, pp. 128-135
-
-
Hafner, M.1
Breu, R.2
Breu, M.3
-
29
-
-
33746064515
-
Security Engineering with Patterns
-
Springer-Verlag, New York, ISBN: 3-540-40731-6
-
M. Schumacher, Security Engineering with Patterns, LNCS, Vol. 2754, Springer-Verlag, New York, 2003. ISBN: 3-540-40731-6.
-
(2003)
LNCS
, vol.2754
-
-
Schumacher, M.1
-
30
-
-
85036996948
-
-
SUN MicroSystems, Java metadata interface, Misc, 2002.
-
SUN MicroSystems, Java metadata interface, Misc, 2002.
-
-
-
-
31
-
-
85036983470
-
-
http://mdr.netbeans.org/.
-
-
-
-
32
-
-
84866552350
-
-
available at
-
OAW 4 EMF Example available at http://www.eclipse.org/gmt/oaw/doc/30_e. mfExam.ple.pdf.
-
OAW 4 EMF Example
-
-
-
33
-
-
84883119070
-
-
available at
-
OAW XPAND Language available at http://www.ecl.ipse.org/gmt/oaw/doc/ r20_xPandReference.pdf.
-
Language
-
-
XPAND, O.A.W.1
-
35
-
-
85037002141
-
-
Object Management Group
-
Object Management Group, http://www.omg.org.
-
-
-
-
38
-
-
23844508158
-
Domain specific modeling, Editorial of Software System Model Journal
-
R. France and B. Rumpe, Domain specific modeling, Editorial of Software System Model Journal 4 (2005), 13.
-
(2005)
, vol.4
, pp. 13
-
-
France, R.1
Rumpe, B.2
-
39
-
-
85036990497
-
-
Role Based Access Control RBAC, avialable at csrc.nist.gov/rbac
-
Role Based Access Control (RBAC), avialable at csrc.nist.gov/rbac/.
-
-
-
-
40
-
-
84941160706
-
-
available at
-
SAML 2.0 Specification, available at http://www.oasis-open.org/ committees/tc_home.php?wg_abbrev-security.
-
SAML 2.0 Specification
-
-
-
41
-
-
85036996537
-
-
www.sectet.org (will be on air by the end of May 2006).
-
www.sectet.org (will be on air by the end of May 2006).
-
-
-
-
42
-
-
85037001829
-
-
SECTETPL: of access rights, available at
-
SECTETPL: A predicative language for the specification of access rights, available at http://qe-informatik.uibk.ac.at/~muhammad/TechnicalReportSECTETPL. pdf.
-
A predicative language for the specification
-
-
-
43
-
-
85036982949
-
-
Web Service Description Language WSDL, available at
-
Web Service Description Language (WSDL), available at http://www.w3.org/TR/wsdl.
-
-
-
-
44
-
-
85036990609
-
-
July 22
-
WSDL First, July 22, 2003, http://webservices.xml.eom/pub/a/ws/2003/07/ 22/wsdlfirst.html.
-
(2003)
-
-
First, W.S.D.L.1
-
45
-
-
77954394878
-
-
available at
-
XACML 2.0 Specification Set, available at http://www.oasis-open.org/ committees/tc_home. php?wg_abbrev=xacml.
-
XACML 2.0 Specification Set
-
-
|