-
1
-
-
55049109759
-
Model-driven security engineering for trust management in SECTET
-
Alam M., Breu R., and Hafner M. Model-driven security engineering for trust management in SECTET. Journal of Software 2 1 (2007) 47-60
-
(2007)
Journal of Software
, vol.2
, Issue.1
, pp. 47-60
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
2
-
-
60849115033
-
A constraint based role based access control in the SECTET - a model-driven approach
-
Ontario, Canada
-
M. Alam, M. Hafner, R. Breu, A constraint based role based access control in the SECTET - a model-driven approach, in: Proceedings of the International Conference on Privacy, Security and Trust, Ontario, Canada, 2006.
-
(2006)
Proceedings of the International Conference on Privacy, Security and Trust
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
3
-
-
47949132086
-
Trusted SCCTET: A model-driven framework for trusted computing based systems
-
Annapolis, Maryland, USA
-
M. Alam, J.P. Seifert, X. Zhang, Trusted SCCTET: a model-driven framework for trusted computing based systems, in: Proceedings of the International Enterprise Distributed Object Computing Conference, Annapolis, Maryland, USA, 2007, pp. 75-87.
-
(2007)
Proceedings of the International Enterprise Distributed Object Computing Conference
, pp. 75-87
-
-
Alam, M.1
Seifert, J.P.2
Zhang, X.3
-
6
-
-
0242625201
-
Model driven security for process-oriented systems
-
ACM Press, Como, Italy
-
Basin D., Doser J., and Lodderstedt T. Model driven security for process-oriented systems. Proceedings of the ACM Symposium on Access Control Models and Technologies (2003), ACM Press, Como, Italy 100-109
-
(2003)
Proceedings of the ACM Symposium on Access Control Models and Technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
8
-
-
60849101638
-
-
L. Bass, F. Bachmann, R.J. Ellison, A.P. Moore, M. Klein, Security and survivability reasoning frameworks and architectural design tactics, in: SEI, 2004.
-
L. Bass, F. Bachmann, R.J. Ellison, A.P. Moore, M. Klein, Security and survivability reasoning frameworks and architectural design tactics, in: SEI, 2004.
-
-
-
-
9
-
-
60849120867
-
-
MITRE
-
D.E. Bell, L.J. LaPadula, Secure Computer Systems: mathematical foundations, EDS-TR-73-278, MITRE MTR-2547, 1973.
-
Secure Computer Systems: Mathematical foundations, EDS-TR-73-278
, vol.MTR-2547
, pp. 1973
-
-
Bell, D.E.1
LaPadula, L.J.2
-
10
-
-
34548787238
-
Model-based security engineering of distributed information systems using UMLsec
-
Minneapolis, MN, USA
-
B. Best, J.Jürjens, B. Nuseibeh, Model-based security engineering of distributed information systems using UMLsec, in: Proceedings of the International Conference on Software Engineering, Minneapolis, MN, USA, 2007, pp. 581-590.
-
(2007)
Proceedings of the International Conference on Software Engineering
, pp. 581-590
-
-
Best, B.1
Jürjens, J.2
Nuseibeh, B.3
-
11
-
-
15544379188
-
In search of a basic principle for model driven engineering
-
Bézivin J. In search of a basic principle for model driven engineering. Upgrade 5 2 (2004) 21-24
-
(2004)
Upgrade
, vol.5
, Issue.2
, pp. 21-24
-
-
Bézivin, J.1
-
12
-
-
60849118456
-
-
A. Bragança, Methodological Approaches and Techniques for Model Driven Development of Software Product Lines, University of Minho: Gualtar, Braga, 204, 2007.
-
A. Bragança, Methodological Approaches and Techniques for Model Driven Development of Software Product Lines, University of Minho: Gualtar, Braga, 204, 2007.
-
-
-
-
13
-
-
48449093676
-
Model Driven Development of Software Product Lines
-
Lisbon, Portugal
-
A. Bragança, R. Machado, Model Driven Development of Software Product Lines, in: Proceedings of the International Conference on the Quality of Information and Communications Technology, Lisbon, Portugal, 2007, pp. 199-203.
-
(2007)
Proceedings of the International Conference on the Quality of Information and Communications Technology
, pp. 199-203
-
-
Bragança, A.1
Machado, R.2
-
14
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, G. Wimmel, Key issues of a formally based process model for security engineering, in: Proceedings of the International Conference on Software and Systems Engineering and their Applications, 2003.
-
(2003)
Proceedings of the International Conference on Software and Systems Engineering and their Applications
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Lotz, V.6
Wimmel, G.7
-
16
-
-
12344265148
-
Model driven security: Unification of authorization models for fine-grain access control
-
Brisbane, Australia
-
C.C. Burt, R.R. Raje, M. Auguston, Model driven security: unification of authorization models for fine-grain access control, in: Proceedings of the International Enterprise Distributed Object Computing Conference, Brisbane, Australia, 2003, pp. 159-172.
-
(2003)
Proceedings of the International Enterprise Distributed Object Computing Conference
, pp. 159-172
-
-
Burt, C.C.1
Raje, R.R.2
Auguston, M.3
-
18
-
-
33845315868
-
P2I: An innovative MDA methodology for embedded real-time systems
-
Porto, Portugal
-
A. Cuccuru, R. De Simone, T. Saunier, G. Siegel, Y. Sorel, P2I: an innovative MDA methodology for embedded real-time systems, in: Proceedings of the Euromicro Conference on Digital System Design, Porto, Portugal, 2005, pp. 26-33.
-
(2005)
Proceedings of the Euromicro Conference on Digital System Design
, pp. 26-33
-
-
Cuccuru, A.1
De Simone, R.2
Saunier, T.3
Siegel, G.4
Sorel, Y.5
-
19
-
-
33646091728
-
Modeling and performance analysis for security aspects
-
Dai L., and Cooper K. Modeling and performance analysis for security aspects. Science of Computer Programming 61 (2006) 58-71
-
(2006)
Science of Computer Programming
, vol.61
, pp. 58-71
-
-
Dai, L.1
Cooper, K.2
-
20
-
-
36048975359
-
Evaluation of MDA-PSM database model quality in the context of selected non-functional requirements
-
Szklarska Poreba, Poland
-
I. Dubielewicz, B. Hnatkowska, Z. Huzar, L. Tuzinkiewicz, Evaluation of MDA-PSM database model quality in the context of selected non-functional requirements, in: Proceedings of the International Conference on Dependability of Computer Systems, Szklarska Poreba, Poland, 2007, pp. 19-26.
-
(2007)
Proceedings of the International Conference on Dependability of Computer Systems
, pp. 19-26
-
-
Dubielewicz, I.1
Hnatkowska, B.2
Huzar, Z.3
Tuzinkiewicz, L.4
-
23
-
-
34247643088
-
Developing secure data warehouses with a UML extension
-
Fernandez-Medina E., Trujillo J., Villarroel R., and Piattini M. Developing secure data warehouses with a UML extension. Information Systems 32 6 (2007) 826-856
-
(2007)
Information Systems
, vol.32
, Issue.6
, pp. 826-856
-
-
Fernandez-Medina, E.1
Trujillo, J.2
Villarroel, R.3
Piattini, M.4
-
24
-
-
33750453781
-
SECTET: an extensible framework for the realization of secure inter-organizational workflows
-
Hafner M., Breu R., Agreiter B., and Nowak A. SECTET: an extensible framework for the realization of secure inter-organizational workflows. Internet Research 16 5 (2006) 491-506
-
(2006)
Internet Research
, vol.16
, Issue.5
, pp. 491-506
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
25
-
-
70350130621
-
A framework for security requirements engineering
-
Shanghai, China
-
C.B. Haley, J.D. Moffet, R. Laney, B. Nuseibeh, A framework for security requirements engineering, in: Proceedings of the Software Engineering for Secure Systems Workshop, Shanghai, China, 2006, pp. 35-42.
-
(2006)
Proceedings of the Software Engineering for Secure Systems Workshop
, pp. 35-42
-
-
Haley, C.B.1
Moffet, J.D.2
Laney, R.3
Nuseibeh, B.4
-
28
-
-
43449136160
-
Model driven design and aspect weaving
-
Jézéquel J. Model driven design and aspect weaving. Software and Systems Modeling 7 2 (2008) 209-218
-
(2008)
Software and Systems Modeling
, vol.7
, Issue.2
, pp. 209-218
-
-
Jézéquel, J.1
-
29
-
-
84882574666
-
A linear time algorithm for deciding security
-
Houston, Texas, USA
-
A.K. Jones, R.J. Lipton, L. Snyder, A linear time algorithm for deciding security, in: Proceedings of the Annual Symposium on Foundations of Computer Security, Houston, Texas, USA, 1976, pp. 33-41.
-
(1976)
Proceedings of the Annual Symposium on Foundations of Computer Security
, pp. 33-41
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
30
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
J. Jézéquel, H. Hussmann, S. Cook Eds, UML 2002, The Unified Modeling Language, Model Engineering, Concepts and Tools, Springer, Dresden, Germany
-
J. Jürjens, UMLsec: extending UML for secure systems development, in: J. Jézéquel, H. Hussmann, S. Cook (Eds.), UML 2002 - The Unified Modeling Language, Model Engineering, Concepts and Tools, LNCS, vol. 2460, Springer, Dresden, Germany, 2002, pp. 412-425.
-
(2002)
LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
33
-
-
57349126199
-
Model-based security analysis for mobile communications
-
IEEE Computer Society, Leipzig, Germany
-
J. Jürjens, J. Schreck, P. Bartmann, Model-based security analysis for mobile communications, in: Proceedings of the International Conference on Software Engineering, IEEE Computer Society, Leipzig, Germany, 2008.
-
(2008)
Proceedings of the International Conference on Software Engineering
-
-
Jürjens, J.1
Schreck, J.2
Bartmann, P.3
-
36
-
-
70350215410
-
Model-driven generation of web applications in UWE
-
Como, Italy
-
A. Kraus, A. Knapp, N. Koch, Model-driven generation of web applications in UWE, in: Proceedings of the International Workshop on Model-Driven Web Engineering, Como, Italy, 2007.
-
(2007)
Proceedings of the International Workshop on Model-Driven Web Engineering
-
-
Kraus, A.1
Knapp, A.2
Koch, N.3
-
38
-
-
29144529186
-
Applying MDA in traditional database-based application development
-
Coventry, UK
-
B. Li, S. Liu, Z. Yu, Applying MDA in traditional database-based application development, in: Proceedings of the International Conference on Computer Supported Cooperative Work in Design, Coventry, UK, 2005, pp. 1038-1041.
-
(2005)
Proceedings of the International Conference on Computer Supported Cooperative Work in Design
, pp. 1038-1041
-
-
Li, B.1
Liu, S.2
Yu, Z.3
-
39
-
-
47849103762
-
Using MDA to support hypermedia document sharing
-
France
-
B. Lima, J.G. Sousa, D. Lopes, Using MDA to support hypermedia document sharing, in: Proceedings of the International Conference on Software Engineering Advances, French Riviera, France, 2007, pp. 65-71.
-
(2007)
Proceedings of the International Conference on Software Engineering Advances, French Riviera
, pp. 65-71
-
-
Lima, B.1
Sousa, J.G.2
Lopes, D.3
-
40
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security, in: Proceedings of the UML 2002
-
Dresden, Germany, Springer, pp
-
T. Lodderstedt, D. Basin, J. Doser, SecureUML: a UML-based modeling language for model-driven security, in: Proceedings of the UML 2002. The Unified Modeling Language. Model Engineering, Languages Concepts, and Tools. Fifth International Conference, Dresden, Germany, 2002, Springer, pp. 426-441.
-
(2002)
The Unified Modeling Language. Model Engineering, Languages Concepts, and Tools. Fifth International Conference
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
41
-
-
33749078294
-
A component-based UML profile to model embedded real-time systems designed by the MDA approach
-
Hong Kong, China
-
S. Lu, W.A. Halang, L. Zhang, A component-based UML profile to model embedded real-time systems designed by the MDA approach, in: Proceedings of the International Conference on Embedded and Real-Time Computing Systems and Applications, Hong Kong, China, 2005, pp. 563-566.
-
(2005)
Proceedings of the International Conference on Embedded and Real-Time Computing Systems and Applications
, pp. 563-566
-
-
Lu, S.1
Halang, W.A.2
Zhang, L.3
-
42
-
-
33749260690
-
A UML profile for multidimensional modeling in data warehouses
-
Luján-Mora S., Trujillo J., and Song I.Y. A UML profile for multidimensional modeling in data warehouses. Data & Knowledge Engineering 59 3 (2006) 725-769
-
(2006)
Data & Knowledge Engineering
, vol.59
, Issue.3
, pp. 725-769
-
-
Luján-Mora, S.1
Trujillo, J.2
Song, I.Y.3
-
44
-
-
38349026752
-
A model driven modernization approach for automatically deriving multidimensional models in data warehouses
-
Auckland, New Zealand
-
J.N. Mazón, J. Trujillo, A model driven modernization approach for automatically deriving multidimensional models in data warehouses, in: Proceedings of the International Conference on Conceptual Modeling, Auckland, New Zealand, 2007, pp. 56-71.
-
(2007)
Proceedings of the International Conference on Conceptual Modeling
, pp. 56-71
-
-
Mazón, J.N.1
Trujillo, J.2
-
45
-
-
38349030898
-
A model-driven goal-oriented requirement engineering approach for data warehouses
-
Auckland, New Zealand
-
J.N. Mazón, J. Trujillo, A model-driven goal-oriented requirement engineering approach for data warehouses, in: Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, ER 2007 Workshops CMLSA, FP-UML, ONISW, QoIS, RIGiM, SeCoGIS, Auckland, New Zealand, 2007, pp. 255-264.
-
(2007)
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, ER 2007 Workshops CMLSA, FP-UML, ONISW, QoIS, RIGiM, SeCoGIS
, pp. 255-264
-
-
Mazón, J.N.1
Trujillo, J.2
-
46
-
-
33845578292
-
An MDA approach for the development of web applications
-
Munich, Germany
-
S. Meliá, C. Cachero, An MDA approach for the development of web applications, in: Proceedings of the International Conference on Web Engineering, Munich, Germany, 2004, pp. 300-305.
-
(2004)
Proceedings of the International Conference on Web Engineering
, pp. 300-305
-
-
Meliá, S.1
Cachero, C.2
-
47
-
-
38149102817
-
The WebSA approach: applying model driven engineering to web applications
-
Meliá S., and Gomez J. The WebSA approach: applying model driven engineering to web applications. Journal of Web Engineering 5 2 (2006) 121-149
-
(2006)
Journal of Web Engineering
, vol.5
, Issue.2
, pp. 121-149
-
-
Meliá, S.1
Gomez, J.2
-
48
-
-
60849089119
-
-
Addison Wesley
-
S. Mellor, K. Scott, A. Uhl, D. Weise, MDA Distilled: Principles of Model-Driven Architecture, Addison Wesley, 2004.
-
(2004)
Principles of Model-Driven Architecture
-
-
Mellor, S.1
Scott, K.2
Uhl, A.3
Weise, D.4
Distilled, M.D.A.5
-
50
-
-
25844519061
-
Transforming software development: an MDA road map
-
Meservy T., and Fenstermacher K. Transforming software development: an MDA road map. Computer 38 9 (2005) 52-58
-
(2005)
Computer
, vol.38
, Issue.9
, pp. 52-58
-
-
Meservy, T.1
Fenstermacher, K.2
-
52
-
-
60849113797
-
A model-driven approach to architecting secure software
-
Boston, USA
-
E. Oladimeji, S. Supakkul, L. Chung, A model-driven approach to architecting secure software, in: Proceedings of the International Conference on Software Engineering and Knowledge Engineering, Boston, USA, 2007, pp. 535-551.
-
(2007)
Proceedings of the International Conference on Software Engineering and Knowledge Engineering
, pp. 535-551
-
-
Oladimeji, E.1
Supakkul, S.2
Chung, L.3
-
56
-
-
60849115032
-
-
OMG, Meta Object Facility 2.0 Query/View/Transformation Specification, 2007.
-
OMG, Meta Object Facility 2.0 Query/View/Transformation Specification, 2007.
-
-
-
-
58
-
-
51449106339
-
Enterprise modeling for information system development within MDA
-
Waikoloa, Big Island, Hawaii
-
J. Osis, E. Asnina, Enterprise modeling for information system development within MDA, in: Proceedings of the Annual Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii, 2008, pp. 490-501.
-
(2008)
Proceedings of the Annual Hawaii International Conference on System Sciences
, pp. 490-501
-
-
Osis, J.1
Asnina, E.2
-
59
-
-
60849131818
-
MDA oriented computation independent modeling of the problem domain
-
Barcelona, Spain
-
J. Osis, E. Asnina, A. Grave, MDA oriented computation independent modeling of the problem domain, in: Proceedings of the International Working Conference on Evaluation of Novel Approaches to Software Engineering, Barcelona, Spain, 2007, pp. 66-71.
-
(2007)
Proceedings of the International Working Conference on Evaluation of Novel Approaches to Software Engineering
, pp. 66-71
-
-
Osis, J.1
Asnina, E.2
Grave, A.3
-
61
-
-
37249076412
-
Analysis-level classes from secure business processes through model transformations
-
Regensburg, Germany
-
A. Rodriguez, E. Fernandez-Medina, M. Piattini, Analysis-level classes from secure business processes through model transformations, in: Proceedings of the International Conference on Trust, Privacy and Security in Digital Business, Regensburg, Germany, 2007, pp. 104-114.
-
(2007)
Proceedings of the International Conference on Trust, Privacy and Security in Digital Business
, pp. 104-114
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
62
-
-
38949100023
-
An MDA approach to develop secure business processes through a UML 2.0 extension, computer systems
-
Rodriguez A., Fernandez-Medina E., and Piattini M. An MDA approach to develop secure business processes through a UML 2.0 extension, computer systems. Science and Engineering 22 5 (2007) 307-319
-
(2007)
Science and Engineering
, vol.22
, Issue.5
, pp. 307-319
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
63
-
-
38049100950
-
Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases
-
Brisbane, Australia
-
A. Rodriguez, E. Fernández-Medina, M. Piattini, Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases, in: Proceedings of the International Conference on Business Process Management, Brisbane, Australia, 2007, pp. 408-415.
-
(2007)
Proceedings of the International Conference on Business Process Management
, pp. 408-415
-
-
Rodriguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
64
-
-
35548986348
-
SECRDW: An extension of the relational package from CWM for representing secure data warehouses at the logical level
-
Funchal, Madeira, Portugal
-
E. Soler, J. Trujillo, E. Fernandez-Medina, M. Piattini, SECRDW: an extension of the relational package from CWM for representing secure data warehouses at the logical level, in: Proceedings of the International Workshop on Security in Information Systems, Funchal, Madeira, Portugal, 2007, pp. 245-256.
-
(2007)
Proceedings of the International Workshop on Security in Information Systems
, pp. 245-256
-
-
Soler, E.1
Trujillo, J.2
Fernandez-Medina, E.3
Piattini, M.4
-
65
-
-
33845568748
-
Application MDA in a conception design environment
-
Hangzhou, China
-
W. Tan, L. Ma, J. Li, Z. Xiao, Application MDA in a conception design environment, in: Proceedings of the International Multi-Symposiums on Computer and Computational Sciences, Hangzhou, China, 2006, pp. 702-704.
-
(2006)
Proceedings of the International Multi-Symposiums on Computer and Computational Sciences
, pp. 702-704
-
-
Tan, W.1
Ma, L.2
Li, J.3
Xiao, Z.4
-
67
-
-
35248878658
-
Model transformation for object-relational database development
-
Seoul, Korea
-
J.M. Vara, B. Vela, J.M. Cavero, E. Marcos, Model transformation for object-relational database development, in: Proceedings of the ACM Symposium on Applied Computing, Seoul, Korea, 2007, pp. 1012-1019.
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 1012-1019
-
-
Vara, J.M.1
Vela, B.2
Cavero, J.M.3
Marcos, E.4
-
68
-
-
35048829286
-
A model driven approach for XML database development
-
Shanghai, China
-
B. Vela, C.J. Acuña, E. Marcos, A model driven approach for XML database development, in: Proceedings of the International Conference on Conceptual Modeling, Shanghai, China, 2004, pp. 780-794.
-
(2004)
Proceedings of the International Conference on Conceptual Modeling
, pp. 780-794
-
-
Vela, B.1
Acuña, C.J.2
Marcos, E.3
-
69
-
-
33749606997
-
Model Driven Development of Secure XML Databases
-
Vela B., Fernandez-Medina E., Marcos E., and Piattini M. Model Driven Development of Secure XML Databases. ACM Sigmod Record 35 3 (2006) 22-27
-
(2006)
ACM Sigmod Record
, vol.35
, Issue.3
, pp. 22-27
-
-
Vela, B.1
Fernandez-Medina, E.2
Marcos, E.3
Piattini, M.4
-
70
-
-
34547237820
-
A MDA based SoC Modeling Approach using UML and SystemC
-
Bangladesh
-
Y. Wang, X. Zhou, L. Liang, C. Peng, A MDA based SoC Modeling Approach using UML and SystemC, in: Proceedings of the International Conference on Computer and Information Technology, Baridhara, Bangladesh, 2006, pp. 245-251.
-
(2006)
Proceedings of the International Conference on Computer and Information Technology, Baridhara
, pp. 245-251
-
-
Wang, Y.1
Zhou, X.2
Liang, L.3
Peng, C.4
-
71
-
-
60849097042
-
Performance analysis of security aspects by weaving scenarios from UML models, special issue on software and performance
-
Woodside C.M., Petriu D.C., Petriu D.B., Xu J., Israr T., Georg G., France R., Bieman J.M., Houmb S.H., and Jürjens J. Performance analysis of security aspects by weaving scenarios from UML models, special issue on software and performance. Journal of Systems and Software (2008)
-
(2008)
Journal of Systems and Software
-
-
Woodside, C.M.1
Petriu, D.C.2
Petriu, D.B.3
Xu, J.4
Israr, T.5
Georg, G.6
France, R.7
Bieman, J.M.8
Houmb, S.H.9
Jürjens, J.10
-
72
-
-
39749089267
-
Transform from models to service description based on MDA
-
GuangZhou, China
-
B. Yu, C. Zhang, Y. Zhao, Transform from models to service description based on MDA, in: Proceedings of the Asia-Pacific Conference on Services Computing, GuangZhou, China, 2006, pp. 605-608.
-
(2006)
Proceedings of the Asia-Pacific Conference on Services Computing
, pp. 605-608
-
-
Yu, B.1
Zhang, C.2
Zhao, Y.3
|