-
1
-
-
0036469431
-
Security: Technical, social, and legal challenges
-
Feb
-
B. Arbaugh, "Security: Technical, social, and legal challenges," Computer, vol. 35, issue 2, pp. 109-111, Feb. 2002.
-
(2002)
Computer
, vol.35
, Issue.2
, pp. 109-111
-
-
Arbaugh, B.1
-
2
-
-
3543104941
-
Experimenting different software architectures performance techniques: A case study
-
S. Balsamo, M. Marzolla, and A. D. Marco, "Ex-perimenting different software architectures performance techniques: A case study," in Proceedings of the Fourth International Workshop on Software and Performance, pp. 115-119, 2004.
-
(2004)
in Proceedings of the Fourth International Workshop on Software and Performance
, pp. 115-119
-
-
Balsamo, S.1
Marzolla, M.2
Marco, A.D.3
-
4
-
-
0030126057
-
An invitation to formal methods
-
J. P. Bowen, R. W. Butler, D. L. Dill, R. L. Glass, D. Gries, and A. Hall, "An invitation to formal methods," Computer, vol. 29, issue 4, pp. 16-29, 1996.
-
(1996)
Computer
, vol.29
, Issue.4
, pp. 16-29
-
-
Bowen, J.P.1
Butler, R.W.2
Dill, D.L.3
Glass, R.L.4
Gries, D.5
Hall, A.6
-
5
-
-
18944406183
-
A case study of a formal-ized security architecture
-
A. Brucker, and B. Wolff, "A case study of a formal-ized security architecture," Electronics Notes in The-oretical Computer Science, vol. 80, pp. 1-18, 2003.
-
(2003)
Electronics Notes in The-oretical Computer Science
, vol.80
, pp. 1-18
-
-
Brucker, A.1
Wolff, B.2
-
6
-
-
34249981789
-
Using Security Patterns to Model and Analyze Security Requirements
-
Michigan State University
-
B. Cheng, S. Honrad, L. Campbell, and R. Wasser-mann, Using Security Patterns to Model and Analyze Security Requirements, Technical Report MSU-CSE-03-18, Department of Computer Science, Michigan State University, 2003.
-
(2003)
Technical Report MSU-CSE-03-18, Department of Computer Science
-
-
Cheng, B.1
Honrad, S.2
Campbell, L.3
Wasser-mann, R.4
-
7
-
-
84874790499
-
-
Computer Emergency Readiness Team Coordination Center (CERT/CC) 2004 E-Crime Watch, available at
-
Computer Emergency Readiness Team Coordination Center (CERT/CC) 2004 E-Crime Watch, available at http://www.cert.org/about/ecrime.html
-
-
-
-
8
-
-
19044365891
-
Performance modelling and analysis of software architectures: an aspect-oriented UML based approach
-
July
-
K. Cooper, L. Dai, and Y. Deng, "Performance modelling and analysis of software architectures: an aspect-oriented UML based approach," Journal of Science of Computer Programming, System and Soft-ware Architectures, vol. 57, no. 1, pp. 89-108, July 2005.
-
(2005)
Journal of Science of Computer Programming, System and Soft-ware Architectures
, vol.57
, Issue.1
, pp. 89-108
-
-
Cooper, K.1
Dai, L.2
Deng, Y.3
-
10
-
-
84874816542
-
Modelling reusable security aspects for software architectures: a pat-tern driven approach
-
July
-
L. Dai, K. Cooper, and E.Wong, "Modelling reusable security aspects for software architectures: a pat-tern driven approach," in Proceedings of the 17th In-ternational Conference on Software Engineering and Knowledge Engineering, pp. 163-168, July 2005.
-
(2005)
in Proceedings of the 17th In-ternational Conference on Software Engineering and Knowledge Engineering
, pp. 163-168
-
-
Dai, L.1
Cooper, K.2
Wong, E.3
-
11
-
-
3042694356
-
Processes for producing secure software
-
May-June
-
N. Davis, W. Humphrey, S. T. Jr. Redwine, G. Zibul-ski, and G. McGraw, "Processes for producing secure software," IEEE Security & Privacy Magazine, vol. 2, no. 3, pp. 18-25, May-June 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.3
, pp. 18-25
-
-
Davis, N.1
Humphrey, W.2
Redwine Jr., S.T.3
Zibul-Ski, G.4
McGraw, G.5
-
12
-
-
20444505719
-
MAC and UML for secure software design
-
T. Doan, S. Demurjian, T. C. Ting, and A. Ket-terl, "MAC and UML for secure software design," in Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 75-85, 2004.
-
(2004)
in Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ket-terl, A.4
-
13
-
-
3242890796
-
-
Addison Wesley Professional
-
R. Filman, T. Elrad, S. Clarke, andM. Aksit, Aspect-Oriented Software Development, Addison Wesley Professional, 2005.
-
(2005)
Aspect-Oriented Software Development
-
-
Filman, R.1
Elrad, T.2
Clarke, S.3
Aksit, M.4
-
14
-
-
0002008223
-
An introduction to soft-ware architecture: advances in software engineering and knowledge engineering
-
D. Garlan and M. Shaw, "An introduction to soft-ware architecture: advances in software engineering and knowledge engineering," World Scientific Pub-lishing, vol. 1, pp 1-40, 1993.
-
(1993)
World Scientific Pub-lishing
, vol.1
, pp. 1-40
-
-
Garlan, D.1
Shaw, M.2
-
17
-
-
1242320326
-
For-mally analyzing software architectural specifications using SAM
-
X. He, H. Yu, T. Shi, J. Ding, and Y. Deng, "For-mally analyzing software architectural specifications using SAM," Journal of Systems and Software, vol. 71, no. 1-2, pp. 11-29, 2004.
-
(2004)
Journal of Systems and Software
, vol.71
, Issue.1-2
, pp. 11-29
-
-
He, X.1
Yu, H.2
Shi, T.3
Ding, J.4
Deng, Y.5
-
18
-
-
0032182029
-
How to formalize It? Formalization principles for informa-tion system development methods
-
A. H. M. Hofstede, and H. A. Proper, "How to formalize It? Formalization principles for informa-tion system development methods," Information and Software Technology, vol. 40, no. 10, pp. 519-540, 1998.
-
(1998)
Information and Software Technology
, vol.40
, Issue.10
, pp. 519-540
-
-
Hofstede, A.H.M.1
Proper, H.A.2
-
23
-
-
79955143136
-
Se-cureUML: A UML-based modelling language for model-driven security
-
T. Lodderstedt, D. Basin, and J. Doser, "Se-cureUML: A UML-based modelling language for model-driven security," in Proceedings of the 5th International Conference on The Unified Modelling Language, pp. 426-441, 2002.
-
(2002)
in Proceedings of the 5th International Conference on The Unified Modelling Language, pp. 426-441,
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
24
-
-
0003757663
-
Domain Names -Concepts and Facilities
-
November
-
P. V. Mockapetris, Domain Names -Concepts and Facilities, IETF STD0013, November, 1987.
-
(1987)
IETF STD0013
-
-
Mockapetris, P.V.1
-
25
-
-
17644404813
-
Security check: a formal yet practical framework for secure software architecture
-
A. Ray, "Security check: a formal yet practical framework for secure software architecture," in Pro-ceedings of the 2003 Workshop on New Security Paradigms, pp. 59-65, 2003.
-
(2003)
in Pro-ceedings of the 2003 Workshop on New Security Paradigms
, pp. 59-65
-
-
Ray, A.1
-
26
-
-
0003547470
-
-
Addison-Wesley, Reading, MA
-
J. Rumbaugh, I. Jacobson, and G. Booch, The Uni-fied Modelling Language Reference Manual, 2nd Edi-tion, Addison-Wesley, Reading, MA, 2004.
-
(2004)
The Uni-fied Modelling Language Reference Manual, 2nd Edi-tion
-
-
Rumbaugh, J.1
Jacobson, I.2
Booch, G.3
-
27
-
-
0016555241
-
The protection of infor-mation in computer systems
-
J. Saltzer andM. Schroeder, "The protection of infor-mation in computer systems," Proceedings of IEEE, vol. 63, no. 9, pp. 1278-1308, 1975.
-
(1975)
Proceedings of IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
29
-
-
84874803444
-
-
Software Design Group, the Alloy Analyzer, archived at
-
Software Design Group, the Alloy Analyzer, archived at http://alloy.mit.edu, 2002-2005.
-
(2002)
-
-
-
30
-
-
33646094363
-
Develop-ing secure applications through aspect-oriented pro-gramming
-
B. Win, W. Joosen, and f. Piessens, "Develop-ing secure applications through aspect-oriented pro-gramming," Aspect-Oriented Software Development (ISBN: 0321219767), pp. 633-651, 2005.
-
(2005)
Aspect-Oriented Software Development (ISBN: 0321219767)
, pp. 633-651
-
-
Win, B.1
Joosen, W.2
Piessens, F.3
-
31
-
-
84874785751
-
Formal software architecture design of secure distributed systems
-
H. Yu, X. He, S. Gao, and Y. Deng, "Formal software architecture design of secure distributed systems," in Proceedings of the Fifteenth International Conference on Software Engineering and Knowledge Engineering (SEKE';03), pp. 450-457, 2003.
-
(2003)
in Proceedings of the Fifteenth International Conference on Software Engineering and Knowledge Engineering (SEKE';03)
, pp. 450-457
-
-
Yu, H.1
He, X.2
Gao, S.3
Deng, Y.4
|