-
1
-
-
84976770519
-
System R: Relational Approach to Database Management
-
M. M. Astrahan et al., "System R: Relational Approach to Database Management.", ACM Trans. on Database Syst, vol. 1, No 2, 1976, 97-137
-
(1976)
ACM Trans. on Database Syst
, vol.1
, Issue.2
, pp. 97-137
-
-
Astrahan, M.M.1
-
2
-
-
34548787238
-
Model-based Security Engineering of Distributed Information Systems using UMLsec
-
ACM
-
B. Best, J. Jurjens and B. Nuseibeh, Model-based Security Engineering of Distributed Information Systems using UMLsec, 29th International Conference on Software Engineering (ICSE 2007), ACM, 2007, pages 581-590
-
(2007)
29th International Conference on Software Engineering (ICSE
, pp. 581-590
-
-
Best, B.1
Jurjens, J.2
Nuseibeh, B.3
-
3
-
-
0004190705
-
-
Addison-Wesley
-
S. Castano, M. Fugini, G. Martella, and P. Samarati, Database security, Addison-Wesley, 1994.
-
(1994)
Database security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
4
-
-
78651429914
-
A UML-based methodology for secure systems: The design stage
-
Miami, May 24-25
-
E.B. Fernandez, T. Sorgente, and M.M. Larrondo-Petrie, "A UML-based methodology for secure systems: The design stage", Procs. of the Third International Workshop on Security in Information Systems (WOSIS-2005), Miami, May 24-25, 2005, 207-216.
-
(2005)
Procs. of the Third International Workshop on Security in Information Systems (WOSIS-2005)
, pp. 207-216
-
-
Fernandez, E.B.1
Sorgente, T.2
Larrondo-Petrie, M.M.3
-
5
-
-
16344386616
-
Designing secure databases
-
E. Fernández-Medina and M. Piattini, "Designing secure databases". Information and Software Technology, vol. 47, No 7, 2005, 463-477.
-
(2005)
Information and Software Technology
, vol.47
, Issue.7
, pp. 463-477
-
-
Fernández-Medina, E.1
Piattini, M.2
-
6
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
Chapter 5, H. Mouratidis and P. Giorgini Eds, IDEA Press
-
E. B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. Van Hilst, "A methodology to develop secure systems using patterns", Chapter 5 in "Integrating security and software engineering: Advances and future vision", H. Mouratidis and P. Giorgini (Eds.), IDEA Press, 2006, 107-126.
-
(2006)
Integrating security and software engineering: Advances and future vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Van Hilst, M.4
-
7
-
-
57849143586
-
Using security patterns to build secure systems
-
APSEC
-
E.B. Fernandez, N. Yoshioka, H. Washizaki, and J. Jurjens, "Using security patterns to build secure systems", position paper in the 1st Int. Workshop on Software Patterns and Quality (SPAQu'07), Nagoya, Japan, December 3, 2007, collocated with the 14th Asia-Pacific Software Engineering Conference (APSEC).
-
position paper in the 1st Int. Workshop on Software Patterns and Quality (SPAQu'07), Nagoya, Japan, December 3, 2007, collocated with the 14th Asia-Pacific Software Engineering Conference
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
Jurjens, J.4
-
8
-
-
34248333055
-
Securing analysis patterns
-
March 23-24, Winston-Salem, North Carolina
-
E.B. Fernandez and X.Y. Yuan, "Securing analysis patterns", Procs. of the 45th ACM Southeast Conference (ACMSE 2007), March 23-24, 2007, Winston-Salem, North Carolina.
-
(2007)
Procs. of the 45th ACM Southeast Conference (ACMSE
-
-
Fernandez, E.B.1
Yuan, X.Y.2
-
9
-
-
0041667570
-
Secure database development methodologies
-
C. E. Landwehr Ed, Elsevier Science Publishers B.V, North-Holland
-
M. Fugini, "Secure database development methodologies", in Database Security: Status and Prospects, C. E. Landwehr (Ed.), Elsevier Science Publishers B.V. (North-Holland), 1988, 103-129.
-
(1988)
Database Security: Status and Prospects
, pp. 103-129
-
-
Fugini, M.1
-
11
-
-
33244457785
-
Sound Methods and Effective Tools for Model-based Security Engineering with UML
-
ACM
-
J. Jurjens, "Sound Methods and Effective Tools for Model-based Security Engineering with UML", 27th International Conference on Software Engineering (ICSE 2005), ACM, 2005, pages 322-331.
-
(2005)
27th International Conference on Software Engineering (ICSE
, pp. 322-331
-
-
Jurjens, J.1
-
12
-
-
57849137172
-
Secure database development
-
to appear in the Systems, Ling Liu and Tamer Oszu eds, Springer Verlag, Berlin, Germany
-
J. Jurjens and E.B. Fernandez, "Secure database development", to appear in the Encyclopedia of Database Systems, Ling Liu and Tamer Oszu (eds.), Springer Verlag, Berlin, Germany.
-
Encyclopedia of Database
-
-
Jurjens, J.1
Fernandez, E.B.2
-
13
-
-
0030086382
-
Role-Based Access Control Models
-
IEEE Press
-
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-Based Access Control Models", IEEE Computer, Vol. 29, No.2, IEEE Press, 1996, 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
33750050331
-
-
J. Wiley & Sons
-
M. Schumacher, E.B. Femandez, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating security and systems engineering, J. Wiley & Sons, 2006.
-
(2006)
Security Patterns: Integrating security and systems engineering
-
-
Schumacher, M.1
Femandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
15
-
-
84976702115
-
The Design and Implementation of INGRES
-
M. Stonebraker, E. Wong, P. Kreps, and G. Held, "The Design and Implementation of INGRES", ACM Trans. on Database Syst., vol. 3, 1976, 189-222.
-
(1976)
ACM Trans. on Database Syst
, vol.3
, pp. 189-222
-
-
Stonebraker, M.1
Wong, E.2
Kreps, P.3
Held, G.4
-
17
-
-
70349713146
-
A development method based on security patterns
-
N. Yoshioka, "A development method based on security patterns", Presentation, NII, Tokyo, Japan, 03/29/06.
-
Presentation, NII, Tokyo, Japan, 03/29/06
-
-
Yoshioka, N.1
|