-
1
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Deng, Y., Wang, J., Tsai, J., and Beznosov, K. An approach for modeling and analysis of security system architectures. IEEE Trans. on Knowledge and Data Engineering. 15, 5, 2003, 1099-1119.
-
(2003)
IEEE Trans. on Knowledge and Data Engineering
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.2
Tsai, J.3
Beznosov, K.4
-
3
-
-
77952395741
-
Applying aspect-orientation in designing security systems: A case study
-
Gao, S., Deng, Y., Yu, H., He, X., Beznosov, K., and Cooper, K. Applying aspect-orientation in designing security systems: A case study. In Proc. of SEKE'04, 2004.
-
(2004)
Proc. of Seke'04
-
-
Gao, S.1
Deng, Y.2
Yu, H.3
He, X.4
Beznosov, K.5
Cooper, K.6
-
4
-
-
84874267738
-
Predicate/transition nets
-
W. Brauer, W. Resig, and G. Rozenberg eds., LNCS 254
-
Genrich, H. J. Predicate/transition nets. Petri Nets: Central Models and Their Properties, W. Brauer, W. Resig, and G. Rozenberg (eds.), LNCS 254, 1987, 207-247.
-
(1987)
Petri Nets: Central Models and Their Properties
, pp. 207-247
-
-
Genrich, H.J.1
-
5
-
-
77952346189
-
Planning, petri nets, and intrusion detection
-
Ho, Y., Frincke, D., and Tobin, D. Jr. Planning, Petri nets, and intrusion detection. In Proc. of the 21st National Information Systems Security Conference (NISSC'98), 1998.
-
(1998)
Proc. of the 21st National Information Systems Security Conference (NISSC'98)
-
-
Ho, Y.1
Frincke, D.2
Tobin, D.J.3
-
8
-
-
35248828504
-
Aspect oriented programming
-
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C. V., Loingtier, J. M., and Irwin, J. Aspect oriented programming. In Proc. of ECOOP'97, 1997, 220-242.
-
(1997)
Proc. of ECOOP'97
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.V.5
Loingtier, J.M.6
Irwin, J.7
-
9
-
-
0242655790
-
Secureuml: A uml-based modeling language for model-driven security
-
Lodderstedt, T., Basin, D., and Doser, Jurgen. SecureUML: A UML-based modeling language for model-driven security. In Proc. of UML'02, 2002.
-
(2002)
Proc. of UML'02
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
10
-
-
0031335394
-
Threat scenarios as a means to formally develop secure systems
-
Lotz, V. Threat scenarios as a means to formally develop secure systems. Journal of Computer Security 5, 1997, 31-67.
-
(1997)
Journal of Computer Security
, vol.5
, pp. 31-67
-
-
Lotz, V.1
-
13
-
-
0024645936
-
Petri nets: Properties, analysis and applications
-
Murata, T. Petri nets: Properties, analysis and applications, Proc. of the IEEE, 77, 4, 1989, 541-580.
-
(1989)
Proc. of the IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
14
-
-
77952333500
-
Principled assuredly trustworthy composable architectures
-
Computer Science Laboratory. SRI International
-
Neumann, P. G. Principled assuredly trustworthy composable architectures, Project Report, Computer Science Laboratory. SRI International, 2004.
-
(2004)
Project Report
-
-
Neumann, P.G.1
-
15
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
Ray, I., France, R., Li, N. and Georg, G. An aspect-based approach to modeling access control concerns. Information and Software Technology, 46, 9, 2004, 575-587.
-
(2004)
Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.2
Li, N.3
Georg, G.4
-
20
-
-
0037250973
-
Formal architectural model for logical agent mobility
-
Xu, D., Yin, J., Deng, Y. and Ding, J. A formal architectural model for logical agent mobility, IEEE Trans. on Software Engineering, 29, 1, 2003, 31-45.
-
(2003)
IEEE Trans. on Software Engineering
, vol.29
, Issue.1
, pp. 31-45
-
-
Xu, D.1
Yin, J.2
Deng, Y.3
Ding, J.A.4
|