메뉴 건너뛰기




Volumn , Issue , 2007, Pages 75-86

A model-driven framework for trusted computing based systems

Author keywords

[No Author keywords available]

Indexed keywords

INTEGRATION;

EID: 47949132086     PISSN: 15417719     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EDOC.2007.4383983     Document Type: Conference Paper
Times cited : (14)

References (38)
  • 1
    • 47949107132 scopus 로고    scopus 로고
    • Experiences Implementing a Higher-Level Policy Language for SELinux in Second Annual SELinux Symposium, 2006. Baltimore, Maryland
    • Experiences Implementing a Higher-Level Policy Language for SELinux in Second Annual SELinux Symposium, 2006. Baltimore, Maryland. http://selinux- symposium.org/2006/abstracts.php.
  • 3
    • 47949104740 scopus 로고    scopus 로고
    • The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation 16 April 2002.
    • The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation 16 April 2002.
  • 4
    • 47949084021 scopus 로고    scopus 로고
    • Trusted computing group teg
    • Trusted computing group (teg). https://www.trustedcomputinggroup.org/ specs/.
  • 5
    • 47949122178 scopus 로고    scopus 로고
    • Uml profile for corba components, may 2003. OMG Document mars/03-05-09.
    • Uml profile for corba components, may 2003. OMG Document mars/03-05-09.
  • 6
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • September
    • A. Pretschner et al. Distributed usage control. Communications of the ACM, 49(9):39-44, September 2006.
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1
  • 7
    • 55049109759 scopus 로고    scopus 로고
    • M. Alam, R. Breu, and M. Hafner. Model-Driven Security Engineering for Trust Management in SECTET. JOURNAL OF SOFTWARE, 2, NO. 1, FEBRUARY 2007, ACADEMY PUBLISHER.
    • M. Alam, R. Breu, and M. Hafner. Model-Driven Security Engineering for Trust Management in SECTET. JOURNAL OF SOFTWARE, VOL. 2, NO. 1, FEBRUARY 2007, ACADEMY PUBLISHER.
  • 10
    • 47949123683 scopus 로고    scopus 로고
    • http://www.antlr.org.
  • 11
    • 35048860896 scopus 로고    scopus 로고
    • Actor-centric modelling of access rights
    • FASE 2004
    • R. Breu and G. Popp. Actor-centric modelling of access rights. In FASE 2004. Springer LNCS Vol. 2984, p. 165-179, 2004.
    • (2004) Springer LNCS , vol.2984 , pp. 165-179
    • Breu, R.1    Popp, G.2
  • 12
    • 47949127896 scopus 로고    scopus 로고
    • K. Czarnecki and S. Helsen. Administration Model for Or-BAC. In Classification of Model Transformation Approaches, 19, OOPSLA'03 Workshop on Generative Techniques in the Context of Model-Driven Architecture.
    • K. Czarnecki and S. Helsen. Administration Model for Or-BAC. In Classification of Model Transformation Approaches, volume 19, OOPSLA'03 Workshop on Generative Techniques in the Context of Model-Driven Architecture.
  • 13
    • 47949109004 scopus 로고    scopus 로고
    • A. M. Devices. AMD Secure Virtual Machine Architecture Reference Manual. AMD, 2005.
    • A. M. Devices. AMD Secure Virtual Machine Architecture Reference Manual. AMD, 2005.
  • 15
    • 47949093094 scopus 로고    scopus 로고
    • V Haldar, D. Chandra, and M. Franz. Semantic remote attestation, a virtual machine directed approach to trusted computing
    • V Haldar, D. Chandra, and M. Franz. Semantic remote attestation - a virtual machine directed approach to trusted computing.
  • 18
    • 85087243734 scopus 로고    scopus 로고
    • Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems
    • Appeared in PhD Symposium of IEEE/ACM Models
    • M. Alam. Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems. Appeared in PhD Symposium of IEEE/ACM Models 2006 LNCS 4364.
    • (2006) LNCS , vol.4364
    • Alam, M.1
  • 20
    • 38149087053 scopus 로고    scopus 로고
    • Modeling Permissions in a (U/X)ML World
    • M. Alam et al. Modeling Permissions in a (U/X)ML World. In IEEEARES, 2006.
    • (2006) IEEEARES
    • Alam, M.1
  • 21
    • 47949100113 scopus 로고    scopus 로고
    • Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment
    • M. Hafner et al. Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment. In IEEE ICWS 2005,ISBN: 0-7695-2409-5.
    • IEEE ICWS 2005,ISBN: 0-7695-2409-5
    • Hafner, M.1
  • 22
    • 47949119000 scopus 로고    scopus 로고
    • M. Hafner, M. Alam, R. Breu. A MOF/QVT-based Domain Architecture for Model Driven Security . In IEEE/ACM Models 2006 LNCS 4199.
    • M. Hafner, M. Alam, R. Breu. A MOF/QVT-based Domain Architecture for Model Driven Security . In IEEE/ACM Models 2006 LNCS 4199.
  • 23
    • 38349165472 scopus 로고    scopus 로고
    • A Security Architecture For Inter-organizational Workflows-Putting WS Security Standards Together
    • ISBN
    • M. Hafner., R. Breu, and M. Breu. A Security Architecture For Inter-organizational Workflows-Putting WS Security Standards Together. In ICEIS 2005,ISBN: 972-8865-19-8.
    • ICEIS 2005
    • Hafner, M.1    Breu, R.2    Breu, M.3
  • 28
    • 47949091458 scopus 로고    scopus 로고
    • Model Driven Security for InterOrganizational Workflows in e-Government
    • R. Breu et al. Model Driven Security for InterOrganizational Workflows in e-Government. In TCGOV 2005,Proceedings. ISBN 3-540-25016-6.
    • TCGOV 2005,Proceedings. ISBN 3-540-25016-6
    • Breu, R.1
  • 29
    • 26444432193 scopus 로고    scopus 로고
    • Web service engineering - advancing a new software engineering discipline
    • ICWE 2005, Springer
    • R. Breu et al. Web service engineering - advancing a new software engineering discipline. In ICWE 2005, LNCS 3579 Springer 2005.
    • (2005) LNCS , vol.3579
    • Breu, R.1
  • 30
    • 47949126255 scopus 로고    scopus 로고
    • Role Based Access Control avialable at. csrc.nist.gov/rbac
    • Role Based Access Control avialable at. csrc.nist.gov/rbac/.
  • 32
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and implementation of a tcg-based integrity measurement architecture. In USENIX Security Symp., 2004.
    • (2004) USENIX Security Symp
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doom, L.4
  • 37
    • 47949096990 scopus 로고    scopus 로고
    • Trusted Computing Software Specification implementation, available at
    • Trusted Computing Software Specification implementation, available at. http://trousers.sourceforge.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.