메뉴 건너뛰기




Volumn 5289 LNCS, Issue , 2008, Pages 36-50

Model-based run-time checking of security permissions using guarded objects

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; SECURITY SYSTEMS;

EID: 57049136634     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89247-2_3     Document Type: Conference Paper
Times cited : (7)

References (11)
  • 1
    • 1442286773 scopus 로고    scopus 로고
    • On the secure implementation of security protocols
    • Giambiagi, P., Dam, M.: On the secure implementation of security protocols. Sci. Comput. Program. 50(1-3), 73-99 (2004)
    • (2004) Sci. Comput. Program , vol.50 , Issue.1-3 , pp. 73-99
    • Giambiagi, P.1    Dam, M.2
  • 3
    • 11144354549 scopus 로고    scopus 로고
    • An overview of the runtime verification tool Java PathExplorer
    • Havelund, K., Rosu, G.: An overview of the runtime verification tool Java PathExplorer. Formal Methods in System Design 24(2), 189-215 (2004)
    • (2004) Formal Methods in System Design , vol.24 , Issue.2 , pp. 189-215
    • Havelund, K.1    Rosu, G.2
  • 4
    • 47249142498 scopus 로고    scopus 로고
    • Jürjens, J., Schreck, J.: Automated analysis of permission-based security using UMLsec. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, 4961. Springer, Heidelberg (2008)
    • Jürjens, J., Schreck, J.: Automated analysis of permission-based security using UMLsec. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol. 4961. Springer, Heidelberg (2008)
  • 6
    • 85086954040 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • Los Alamitos
    • Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: ICSE. IEEE, Los Alamitos (2005)
    • (2005) ICSE. IEEE
    • Jürjens, J.1
  • 7
    • 77953981798 scopus 로고    scopus 로고
    • Tools for model-based security engineering: Models vs.code
    • ACM, New York
    • Jürjens, J., Yu, Y.: Tools for model-based security engineering: Models vs.code. In: 22nd IEEE/ACM Int. Conf. Autom. Softw. Eng. ACM, New York (2007)
    • (2007) 22nd IEEE/ACM Int. Conf. Autom. Softw. Eng
    • Jürjens, J.1    Yu, Y.2
  • 9
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 10
    • 33947695249 scopus 로고    scopus 로고
    • Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative Role Based Access Control. In: CSFW, pp. 124-138. IEEE, Los Alamitos (2006)
    • Sasturkar, A., Yang, P., Stoller, S.D., Ramakrishnan, C.R.: Policy analysis for administrative Role Based Access Control. In: CSFW, pp. 124-138. IEEE, Los Alamitos (2006)
  • 11
    • 57049122296 scopus 로고    scopus 로고
    • Security verification tool (2001-2008), http://computing-research.open. ac.uk/jj/umlsectool
    • Security verification tool (2001-2008), http://computing-research.open. ac.uk/jj/umlsectool


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.