-
1
-
-
84970947585
-
Software Engineering for Security: A Roadmap
-
Pages:, Limerick, Ireland, June
-
P. T. Devanbu and S. Stubblebine, "Software Engineering for Security: a Roadmap", International Conference on Software Engineering, Proceedings of the Conference on the Future of Software Engineering, Pages:227-239, Limerick, Ireland, June 2000.
-
(2000)
International Conference on Software Engineering, Proceedings of the Conference on the Future of Software Engineering
, pp. 227-239
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
2
-
-
33745471209
-
Model Driven Security: From UML Models to Acccess Cotnrol Infrastructures
-
pages:, January
-
D. Basin, J. Doser and T. Lodderstedt, "Model Driven Security: from UML Models to Acccess Cotnrol Infrastructures", ACM Transactions on Software Engineering and Methodology (TOSEM), volume 15, issue 1, pages:39-91, January 2006.
-
(2006)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
29744447253
-
Business-driven security: From modeling to managing secure applications
-
N. Nagaratnam, A. Nadalin, M. Honda, M. McIntosh and P. Austel, "Business-driven security: From modeling to managing secure applications", IBM Systems Journal, volume 44, no 4, 2005.
-
(2005)
IBM Systems Journal
, vol.44
, Issue.4
-
-
Nagaratnam, N.1
Nadalin, A.2
Honda, M.3
McIntosh, M.4
Austel, P.5
-
4
-
-
55049109759
-
-
M. Alam, M. Hafner, R. Breu., Model-Driven Security Engineering for Trust Management in SECTET, Journal of Software, Academy Publisher, 2, no. 1, February 2007.
-
M. Alam, M. Hafner, R. Breu., Model-Driven Security Engineering for Trust Management in SECTET", Journal of Software, Academy Publisher, volume 2, no. 1, February 2007.
-
-
-
-
5
-
-
51349154971
-
-
OASIS extensible Access Control Markup Language XACML
-
OASIS extensible Access Control Markup Language (XACML),
-
-
-
-
6
-
-
33749040692
-
Model-Driven Security Based on a Web Services Security Architecture
-
Pages:, July
-
Y. Nakamura, M. Tatsubori, T. Imamura, and Koichi Ono, "Model-Driven Security Based on a Web Services Security Architecture", In Proceedings of the 2005 IEEE International Conference on Service Computing (SCC'05), Pages:7-15, July 2005.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Service Computing (SCC'05)
, pp. 7-15
-
-
Nakamura, Y.1
Tatsubori, M.2
Imamura, T.3
Ono, K.4
-
9
-
-
48349117599
-
Security Conscious Web Service Composition with Semantic Web Support
-
Istanbul, Turkey, April
-
R. Bishop, B. Carminati, E. Ferrari, P.C.K. Hung, "Security Conscious Web Service Composition with Semantic Web Support", In Proceedings of the 1st ICDE Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP'07), Istanbul, Turkey, April 2007.
-
(2007)
Proceedings of the 1st ICDE Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP'07)
-
-
Bishop, R.1
Carminati, B.2
Ferrari, E.3
Hung, P.C.K.4
-
11
-
-
33746730481
-
-
M. Wimmer, A. Kemper, M. Rits and V. Lotz, Consolidating the Access Control of Composite Applications and Workflows, In the Proceedings of 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 44-59, Sophia Antipolis, France, July-August 2006.
-
M. Wimmer, A. Kemper, M. Rits and V. Lotz, Consolidating the Access Control of Composite Applications and Workflows", In the Proceedings of 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 44-59, Sophia Antipolis, France, July-August 2006.
-
-
-
-
13
-
-
51349097637
-
-
The EU Project TrustCoM
-
The EU Project TrustCoM, http.//www.eu-trustcom.com
-
-
-
-
14
-
-
51349088454
-
-
N. R. Mead, E. D. Hough and T. R Stehney II, Security Quality Requirements Engineering (SQUARE) Methodology, Technical Report, CMU/SEI-2005-TR-009, ESC-TR-2005-009, http://www.sei.cmu.edu/publications/ documents/05.reports/05tr009.html
-
N. R. Mead, E. D. Hough and T. R Stehney II, "Security Quality Requirements Engineering (SQUARE) Methodology", Technical Report, CMU/SEI-2005-TR-009, ESC-TR-2005-009, http://www.sei.cmu.edu/publications/ documents/05.reports/05tr009.html
-
-
-
-
15
-
-
33750050331
-
Security Patterns: Integrating Security and Systems Engineering
-
ISBN-10:0470858842
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, P. Sommerlad, "Security Patterns: Integrating Security and Systems Engineering", Wiley Software Patterns Series, ISBN-10:0470858842
-
Wiley Software Patterns Series
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
16
-
-
84944105044
-
Regulations Expressed As Logical Models (REALM)
-
IOS Press, Amsterdam, pages
-
C. Giblin, A. Y Liu, S. Miiller, B. Pfitzmann and X. Zhou, "Regulations Expressed As Logical Models (REALM)", In Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems, IOS Press, Amsterdam, pages:37-48, 2005.
-
(2005)
Proceedings of the 18th Annual Conference on Legal Knowledge and Information Systems
, pp. 37-48
-
-
Giblin, C.1
Liu, A.Y.2
Miiller, S.3
Pfitzmann, B.4
Zhou, X.5
-
18
-
-
35248828504
-
Aspect-Oriented Programming
-
Springer-Verlag, Berlin, Heidelberg, and New York
-
G. Kiczales, J. Lamping, A. Menhdhekar, C. Maeda, C. Lopes, J. Loingtier, and J. Irwin. "Aspect-Oriented Programming". In Proceedings European Conference on Object-Oriented Programming, volume 1241, pages 220-242, Springer-Verlag, Berlin, Heidelberg, and New York, 1997.
-
(1997)
Proceedings European Conference on Object-Oriented Programming
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Menhdhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.6
Irwin, J.7
-
19
-
-
0038486642
-
Design pattern implementation in Java and aspectJ
-
Seattle, Washington, USA, November
-
J. Hannemann, G. Kiczales, "Design pattern implementation in Java and aspectJ". In ACM Object-Oriented Programming, Systems, Languages, and Applications 2002, Seattle, Washington, USA, November, 2002.
-
(2002)
ACM Object-Oriented Programming, Systems, Languages, and Applications 2002
-
-
Hannemann, J.1
Kiczales, G.2
-
20
-
-
51349105622
-
Modularizing Advanced Transaction Management - Tackling Tangled Aspect Code
-
PhD thesis, Vrije Universiteit Brussel
-
J. Fraby, "Modularizing Advanced Transaction Management - Tackling Tangled Aspect Code", PhD thesis, Vrije Universiteit Brussel, 2005.
-
(2005)
-
-
Fraby, J.1
-
21
-
-
51349140685
-
-
WS-Policy
-
WS-Policy, http://www.w3org/Submission/WS-Policy/
-
-
-
-
22
-
-
51349142480
-
-
WS-SecurityPolicy, docs.oasis-open.org/ws-sx/wssecuritypolicy/200702/ws- securitypolicy-1.2-spec-cs.pdf
-
WS-SecurityPolicy, docs.oasis-open.org/ws-sx/wssecuritypolicy/200702/ws- securitypolicy-1.2-spec-cs.pdf
-
-
-
-
23
-
-
78449255162
-
Automated Trust Negotiation in Open Systems
-
edited by T. Yu and S. Jajodia, Springer, December
-
J. Lee, K. E. Seamons, M. Winslett and T. Yu,. "Automated Trust Negotiation in Open Systems", In Secure Data Management in Decentralized Systems, edited by T. Yu and S. Jajodia, Springer, December 2006.
-
(2006)
Secure Data Management in Decentralized Systems
-
-
Lee, J.1
Seamons, K.E.2
Winslett, M.3
Yu, T.4
-
24
-
-
57849124029
-
-
WS-Federation, http://www.ibm.com/developers/libary/specificatin/ws-fed/
-
WS-Federation
-
-
-
26
-
-
38549112088
-
An inventory of security patterns
-
Technical Report CW-469, Katholieke Universiteit Leuven, Department of Computer Science
-
K. Yskout, T. Heyman, R. Scandariato, and W. Joosen, "An inventory of security patterns", Technical Report CW-469, Katholieke Universiteit Leuven, Department of Computer Science, 2006.
-
(2006)
-
-
Yskout, K.1
Heyman, T.2
Scandariato, R.3
Joosen, W.4
-
27
-
-
48049112365
-
-
Manning Publications, New York, Januar
-
D. Koenig, "Groovy in Action", Manning Publications, New York, Januar, 2007.
-
(2007)
Groovy in Action
-
-
Koenig, D.1
-
30
-
-
0038613719
-
Secure Mediation: Requirements, Design, and Architecture
-
pages
-
C. Altenschmidt, J. Biskup, U. Flegel and Y. Karabulut, "Secure Mediation: Requirements, Design, and Architecture", Journal of Computer Security, volume 11, number 3, pages:365-398, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 365-398
-
-
Altenschmidt, C.1
Biskup, J.2
Flegel, U.3
Karabulut, Y.4
-
32
-
-
51349115855
-
-
Apache WS-Commons Policy, http://ws.apache.org/commons/policy/index.html
-
Apache WS-Commons Policy, http://ws.apache.org/commons/policy/index.html
-
-
-
-
33
-
-
51349123779
-
-
WS-BPEL
-
WS-BPEL, http://www.oasisopen.org/committees/tehome.php?wg abbrev=wsbel
-
-
-
-
34
-
-
27144544188
-
Service Interaction pattern: Towards a Reference Framework for Service-based Business Process Interconnection
-
Technical Report FIT-TR-2005-02, Faculty of Information Technology, Queensland University of Technology, Brisbane, Australia, March
-
A. Barros, M. Dumas and A. ter Hofstede, "Service Interaction pattern: Towards a Reference Framework for Service-based Business Process Interconnection". Technical Report FIT-TR-2005-02, Faculty of Information Technology, Queensland University of Technology, Brisbane, Australia, March 2005.
-
(2005)
-
-
Barros, A.1
Dumas, M.2
ter Hofstede, A.3
-
35
-
-
51349157427
-
-
SAML
-
SAML, http://www.oasisopen.org/committees/tehome.php?wg abbrev=security
-
-
-
-
36
-
-
51349100147
-
-
SCA Policy Framework
-
SCA Policy Framework, http://www.oasis-opencsa.org/SCA-policyframework
-
-
-
|