-
2
-
-
55049114454
-
-
Jürjens J, Rumm R. Security analysis of complex telematics systems at the hand of the electronic health card: Experimental results. 2007. http://mcs.open.ac.uk/jj2924/umlsectool/applications/healthcard
-
Jürjens J, Rumm R. Security analysis of complex telematics systems at the hand of the electronic health card: Experimental results. 2007. http://mcs.open.ac.uk/jj2924/umlsectool/applications/healthcard
-
-
-
-
3
-
-
34548787238
-
Model-based security engineering of distributed information systems using UMLsec
-
Minneapolis. IEEE Computer Society;
-
Best B, Jürjens J, Nuseibeh B. Model-based security engineering of distributed information systems using UMLsec. 29th International Conference on Software Engineering (ICSE 2007), Minneapolis. IEEE Computer Society; 2007. pp 581-590.
-
(2007)
29th International Conference on Software Engineering (ICSE
, pp. 581-590
-
-
Best, B.1
Jürjens, J.2
Nuseibeh, B.3
-
6
-
-
33749391615
-
Model-based security engineering for real
-
14th Intern Symposium on Formal Methods FM
-
Jürjens J. Model-based security engineering for real. 14th Intern Symposium on Formal Methods (FM 2006). LNCS 2006; 4085: 600-606.
-
(2006)
LNCS
, vol.4085
, pp. 600-606
-
-
Jürjens, J.1
-
7
-
-
33745264384
-
Modelling privilege management and access control
-
Blobel B, Nordberg R, Davis J, Pharow P. Modelling privilege management and access control. International Journal of Medical Informatics 2006; 75, 8: 597-623.
-
(2006)
International Journal of Medical Informatics
, vol.75
, Issue.8
, pp. 597-623
-
-
Blobel, B.1
Nordberg, R.2
Davis, J.3
Pharow, P.4
-
8
-
-
33846828667
-
A model-driven approach for the German health telematics architectural framework and security infrastructure
-
Blobel B, Pharow P. A model-driven approach for the German health telematics architectural framework and security infrastructure. International Journal of Medical Informatics 2007; 76, 2-3: 169-175.
-
(2007)
International Journal of Medical Informatics
, vol.76
-
-
Blobel, B.1
Pharow, P.2
-
10
-
-
55049104472
-
-
Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell J, Pretschner A eds, available at
-
Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell J, Pretschner A (eds.). Workshop on Model-based Trustworthy Health Information Systems (MOTHIS_models), 2007. Contributions available at http://mothis.isis.vanderbilt.edu
-
Workshop on Model-based Trustworthy Health Information Systems (MOTHIS_models), 2007. Contributions
-
-
-
11
-
-
55049109759
-
Model-driven security engineering for trust management in SECTET
-
Alam M, Hafner M, Breu R. Model-driven security engineering for trust management in SECTET. Journal of Software 2007; 2, 1: 47-59.
-
(2007)
Journal of Software
, vol.2
, Issue.1
, pp. 47-59
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
12
-
-
55049085563
-
-
Agreiter B, Alam M, Hafner M, Seifert J-P, Zhang X. Model driven configuration of secure operating systems for mobile applications in healthcare. In: Sztipanovits et al. [10].
-
Agreiter B, Alam M, Hafner M, Seifert J-P, Zhang X. Model driven configuration of secure operating systems for mobile applications in healthcare. In: Sztipanovits et al. [10].
-
-
-
-
14
-
-
84949226562
-
The CORAS framework for a model-based risk management process. SAFECOMP
-
Fredriksen R, Kristiansen M, Gran B, Stølen K, Opperud T, Dimitrakos T. The CORAS framework for a model-based risk management process. SAFECOMP. LNCS 2002; 2434: 94-105.
-
(2002)
LNCS
, vol.2434
, pp. 94-105
-
-
Fredriksen, R.1
Kristiansen, M.2
Gran, B.3
Stølen, K.4
Opperud, T.5
Dimitrakos, T.6
-
15
-
-
55049142401
-
-
Mathe J, Duncavage S, Werner J, Malin B, Ledeczi A, and Sztipanovits J. Implementing a model-based design environment for clinical information systems. In: Sztipanovits et al. [10].
-
Mathe J, Duncavage S, Werner J, Malin B, Ledeczi A, and Sztipanovits J. Implementing a model-based design environment for clinical information systems. In: Sztipanovits et al. [10].
-
-
-
-
16
-
-
55049084625
-
-
Gesetz zur Modemisierung der gesetzlichen Krankenversicherung (GKV-Modemisierungsgesetz/GMG). Germany, Bundesgesetzblatt 2003; I: 2190.
-
Gesetz zur Modemisierung der gesetzlichen Krankenversicherung (GKV-Modemisierungsgesetz/GMG). Germany, Bundesgesetzblatt 2003; I: 2190.
-
-
-
-
17
-
-
55049095114
-
-
Bundesdatenschutzgesetz (BDSG). Germany, Bundesgesetzblatt 2007; I: 201 and 1977; I: 66.
-
Bundesdatenschutzgesetz (BDSG). Germany, Bundesgesetzblatt 2007; I: 201 and 1977; I: 66.
-
-
-
-
18
-
-
55049096985
-
-
Bundesministerium des Innern. Standards und Architekturen fur E-Government-Anwendungen SAGA Version 4.0, Germany, Mar. 2008
-
Bundesministerium des Innern. Standards und Architekturen fur E-Government-Anwendungen (SAGA Version 4.0). Germany, Mar. 2008.
-
-
-
-
19
-
-
55049132229
-
-
Bundesamt für Sicherheit in der Informationstechnik, Germany, Available at
-
Bundesamt für Sicherheit in der Informationstechnik, IT Sicherheit auf Basis der Common Criteria - ein Leiffaden. Germany, 2005. Available at http://www.bsi.bund.de/cc/cc_leitf.pdf
-
(2005)
IT Sicherheit auf Basis der Common Criteria - ein Leiffaden
-
-
-
20
-
-
55049138562
-
-
Gesetz über Rahmenbedingungen für elektronische Signaturen (Signaturgesetz/SigG). Germany, Bundesgesetzblatt 2001; I: 876 and 2007; I: 179, 185.
-
Gesetz über Rahmenbedingungen für elektronische Signaturen (Signaturgesetz/SigG). Germany, Bundesgesetzblatt 2001; I: 876 and 2007; I: 179, 185.
-
-
-
-
21
-
-
55049137940
-
-
Verordnung zur elektronischen Signatur (Signaturverordnung/SigV). Germany, Bundesgesetzblatt 2001; I: 3074 and 2007; I: 2631, 2671.
-
Verordnung zur elektronischen Signatur (Signaturverordnung/SigV). Germany, Bundesgesetzblatt 2001; I: 3074 and 2007; I: 2631, 2671.
-
-
-
-
22
-
-
55049112358
-
-
eHealth card - bIT4Health architecture. http://www.dimdi.de/static/en/ ehealth. 2007.
-
eHealth card - bIT4Health architecture. http://www.dimdi.de/static/en/ ehealth. 2007.
-
-
-
-
24
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
St. Louis. ACM
-
Jürjens J. Sound methods and effective tools for model-based security engineering with UML. 27th Int. Conf. on Softw. Engineering (ICSE 2005), St. Louis. ACM 2005. pp 322-331.
-
(2005)
27th Int. Conf. on Softw. Engineering (ICSE
, pp. 322-331
-
-
Jürjens, J.1
-
25
-
-
35348959376
-
-
Jürjens J, Shabalin P. Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 2007; 9: 527-544. Invited submission to the special issue for FASE 2004/05.
-
Jürjens J, Shabalin P. Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 2007; 9: 527-544. Invited submission to the special issue for FASE 2004/05.
-
-
-
-
26
-
-
55049098914
-
-
UMLsee tool. 2001-08. http://mes.open.ac.uk/jj2924/umlsectool.
-
UMLsee tool. 2001-08. http://mes.open.ac.uk/jj2924/umlsectool.
-
-
-
|