메뉴 건너뛰기




Volumn 51, Issue 5, 2009, Pages 815-831

Automated analysis of security-design models

Author keywords

Formal analysis; Metamodels; OCL; SecureUML; Security policies; UML

Indexed keywords

ACCESS CONTROL; DESIGN; LINGUISTICS; REAL TIME SYSTEMS; SECURITY SYSTEMS; SPECIFICATIONS;

EID: 60849104397     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2008.05.011     Document Type: Article
Times cited : (99)

References (16)
  • 2
    • 38049059202 scopus 로고    scopus 로고
    • A metamodel-based approach for analyzing security-design models
    • Proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems MODELS, Springer-Verlag
    • D. Basin, M. Clavel, J. Doser, M. Egea, A metamodel-based approach for analyzing security-design models, in: Proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems (MODELS 2007), Lecture Notes in Computer Science, vol. 4735, Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4735
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 5
    • 60849102831 scopus 로고    scopus 로고
    • R.J. Boulton, A. Gordon, M.J.C. Gordon, J. Harrison, J. Herbert, J.V. Tassel, Experience with embedding hardware description languages in HOL, in: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, North-Holland, 1992.
    • R.J. Boulton, A. Gordon, M.J.C. Gordon, J. Harrison, J. Herbert, J.V. Tassel, Experience with embedding hardware description languages in HOL, in: Proceedings of the IFIP TC10/WG 10.2 International Conference on Theorem Provers in Circuit Design, North-Holland, 1992.
  • 6
    • 60849105402 scopus 로고    scopus 로고
    • F.B. e Abreu, Using OCL to Formalize Object Oriented Metrics Definitions, Technical Report ES007/2001, FCT/UNL and INESC, Portugal. Available from: , June, 2001.
    • F.B. e Abreu, Using OCL to Formalize Object Oriented Metrics Definitions, Technical Report ES007/2001, FCT/UNL and INESC, Portugal. Available from: , June, 2001.
  • 9
    • 84944220091 scopus 로고    scopus 로고
    • J. Jürjens, Towards development of secure systems using UMLsec, in: H. Hussmann (Ed.), Fundamental Approaches to Software Engineering, (FASE/ETAPS 2001), Lecture Notes in Computer Science, 2029, Springer-Verlag, 2001.
    • J. Jürjens, Towards development of secure systems using UMLsec, in: H. Hussmann (Ed.), Fundamental Approaches to Software Engineering, (FASE/ETAPS 2001), Lecture Notes in Computer Science, vol. 2029, Springer-Verlag, 2001.
  • 10
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • J.-M. Jézéquel, H. Hussmann, S. Cook Eds, UML 2002, The Unified Modeling Language, Springer-Verlag
    • J. Jürjens, UMLsec: extending UML for secure systems development, in: J.-M. Jézéquel, H. Hussmann, S. Cook (Eds.), UML 2002 - The Unified Modeling Language, Lecture Notes in Computer Science, vol. 2460, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2460
    • Jürjens, J.1
  • 13
    • 60849083580 scopus 로고    scopus 로고
    • Object Management Group, Unified Modeling Language: Infrastracture, Version 2.1.1, OMG document. Available from:, 2007
    • Object Management Group, Unified Modeling Language: Infrastracture, Version 2.1.1, OMG document. Available from: , 2007.
  • 14
    • 33646027053 scopus 로고    scopus 로고
    • Specification and validation of authorisation constraints using UML and OCL
    • Proceedings of the 10th European Symposium on Research in Computer Security ESORICS, Springer-Verlag
    • K. Sohr, G.J. Ahn, M. Gogolla, L. Migge, Specification and validation of authorisation constraints using UML and OCL, in: Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 2005), Lecture Notes in Computer Science, vol. 3679, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3679
    • Sohr, K.1    Ahn, G.J.2    Gogolla, M.3    Migge, L.4
  • 15
    • 35048840185 scopus 로고    scopus 로고
    • Specifying role-based access constraints with object constraint language
    • Proceedings of the Sixth Asia-Pacific Web Conference APWeb, Springer-Verlag
    • H. Wang, Y. Zhang, J. Cao, J. Yang, Specifying role-based access constraints with object constraint language, in: Proceedings of the Sixth Asia-Pacific Web Conference (APWeb 2004), Lecture Notes in Computer Science, vol. 3007, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3007
    • Wang, H.1    Zhang, Y.2    Cao, J.3    Yang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.