-
1
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006) (Pubitemid 43947939)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
2
-
-
33750370954
-
Model transformations? Transformation models!
-
4199 LNCS Model Driven Engineering Languages and Systems - 9th International Conference, MoDELS 2006, Proceedings
-
B́ezivin, J., B̈uttner, F., Gogolla, M., Jouault, F., Kurtev, I., Lindow, A.: Model transformations? Transformation models! In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 440-453. Springer, Heidelberg (2006) (Pubitemid 44618576)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 440-453
-
-
Bezivin, J.1
Buttner, F.2
Gogolla, M.3
Jouault, F.4
Kurtev, I.5
Lindow, A.6
-
3
-
-
84869344365
-
-
LNCS, Springer, Heidelberg
-
Braga, C., Clavel, M., Duŕan, F., Eker, S., Farzan, A., Hendrix, J., Lincoln, P., Mart́ý-Oliet, N., Meseguer, J., Olveczky, P., Palomino, M., Sasse, R., Stehr, M.-O., Talcott, C., Verdejo, A.: All About Maude - A High-Performance Logical Framework. LNCS, vol. 4350, pp. 667-693. Springer, Heidelberg (2007), http://dx.doi.org/10.1007/978-3-540-71999-1-21
-
(2007)
All About Maude - A High-Performance Logical Framework
, vol.4350
, pp. 667-693
-
-
Braga, C.1
Clavel, M.2
Duŕan, F.3
Eker, S.4
Farzan, A.5
Hendrix, J.6
Lincoln, P.7
Mart́ý-Oliet, N.8
Meseguer, J.9
Olveczky, P.10
Palomino, M.11
Sasse, R.12
Stehr, M.-O.13
Talcott, C.14
Verdejo, A.15
-
4
-
-
33750286091
-
A model transformation semantics and analysis methodology for Secure UML
-
4199 LNCS Model Driven Engineering Languages and Systems - 9th International Conference, MoDELS 2006, Proceedings
-
Brucker, A.D., Doser, J., Wolff, B.: A model transformation semantics and analysis methodology for secureUML. In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 306-320. Springer, Heidelberg (2006) (Pubitemid 44618567)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 306-320
-
-
Brucker, A.D.1
Doser, J.2
Wolff, B.3
-
5
-
-
33745677838
-
An aspect-oriented approach to declarative access control for web applications
-
3841 LNCS Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings
-
Chen, K., Lin, C.-W.: An aspect-oriented approach to declarative access control for web applications. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 176-188. Springer, Heidelberg (2006) (Pubitemid 43973189)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 176-188
-
-
Chen, K.1
Lin, C.-W.2
-
6
-
-
84885402017
-
Automated analysis of security-design models
-
Clavel, M., Basin, D., Doser, J., Egea, M.: Automated analysis of security-design models. Information and Software Technology (2008), http://maude.sip.ucm.es/~clavel/pubs/BCDE07-journal.pdf
-
(2008)
Information and Software Technology
-
-
Clavel, M.1
Basin, D.2
Doser, J.3
Egea, M.4
-
7
-
-
70349862227
-
Model-driven security in practice: An industrial experience
-
In: Schieferdecker, I., Hartman, A. (eds.), Springer, Heidelberg
-
Clavel, M., da Silva, V., Braga, C., Egea, M.: Model-driven security in practice: An industrial experience. In: Schieferdecker, I., Hartman, A. (eds.) ECMDA-FA 2008. LNCS, vol. 5095, pp. 326-337. Springer, Heidelberg (2008), http://maude.sip.ucm.es/~clavel/pubs/CSBE08.pdf
-
(2008)
ECMDA-FA 2008. LNCS
, vol.5095
, pp. 326-337
-
-
Clavel, M.1
Da Silva, V.2
Braga, C.3
Egea, M.4
-
8
-
-
33746040100
-
ITP/OCL: A rewriting-based validation tool for UML+OCL static class diagrams
-
4019 LNCS Algebraic Methodology and Software Technology - 11th International Conference, AMAST 2006
-
Clavel, M., Egea, M.: ITP/OCL: A rewriting-based validation tool for UML+OCL static class diagrams. In: Johnson, M., Vene, V. (eds.) AMAST 2006. LNCS, vol. 4019, pp. 368-373. Springer, Heidelberg (2006) (Pubitemid 44072106)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 368-373
-
-
Clavel, M.1
Egea, M.2
-
9
-
-
14944384797
-
Security through aspect-oriented programming
-
de Win, B., Vanhaute, B., Decker, B.D.: Security through aspect-oriented programming. In: Proceedings of the IFIP TC11 WG 11.4 First Annual Conference on Netwrok Security: Advances in Network and Distributed Systems Security, vol. 206, pp. 125-138 (2001)
-
(2001)
Proceedings of the IFIP TC11 WG 11.4 First Annual Conference on Netwrok Security: Advances in Network and Distributed Systems Security
, vol.206
, pp. 125-138
-
-
De Win, B.1
Vanhaute, B.2
Decker, B.D.3
-
11
-
-
60849109638
-
Applying aspectorientation in designing security systems: A case study
-
Banff, Alberta, Canada, June 20-24
-
Gao, S., Deng, Y., Yu, H., He, X., Beznosov, K., Cooper, K.: Applying aspectorientation in designing security systems: A case study. In: Proceedings of 16th International Conference on Software Engineering and Knowledge Engineering, Banff, Alberta, Canada, June 20-24, pp. 360-365 (2004)
-
(2004)
Proceedings of 16th International Conference on Software Engineering and Knowledge Engineering
, pp. 360-365
-
-
Gao, S.1
Deng, Y.2
Yu, H.3
He, X.4
Beznosov, K.5
Cooper, K.6
-
12
-
-
0027116146
-
Order-sorted algebra I: Equational deduction for multiple inheritance, overloading, exceptions and partial operations
-
DOI 10.1016/0304-3975(92)90302-V
-
Goguen, J.A., Meseguer, J.: Order-sorted algebra I: equational deduction for multiple inheritance, overloading, exceptions and partial operations. Theoretical Computer Science 105(2), 217-273 (1992) (Pubitemid 23588280)
-
(1992)
Theoretical Computer Science
, vol.105
, Issue.2
, pp. 217-273
-
-
Goguen Joseph, A.1
Meseguer Jose2
-
13
-
-
33646180594
-
Dynamic secure aspect modeling with UML: From models to code
-
In: Briand, L.C., Williams, C. (eds.), Springer, Heidelberg
-
J̈urjens, J., Houmb, S.H.: Dynamic secure aspect modeling with UML: From models to code. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 142-145.
-
(2005)
MoDELS 2005. LNCS
, vol.3713
, pp. 142-155
-
-
J̈urjens, J.1
Houmb, S.H.2
-
14
-
-
82955230066
-
An overview of aspect J
-
In: Knudsen, J.L. (ed.), Springer, Heidelberg
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of aspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327-355. Springer, Heidelberg (2001)
-
(2001)
ECOOP 2001. LNCS
, vol.2072
, pp. 327-355
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
16
-
-
67650154964
-
-
J. Miller , Mukerji, J. (eds.): MDA Guide (Version 1.0.1). Number omg/2003-06-01. OMG
-
Miller, J., Mukerji, J. (eds.): MDA Guide (Version 1.0.1). Number omg/2003-06-01. OMG (2006)
-
(2006)
-
-
-
18
-
-
33646186281
-
A formal enforcement framework for role-based access control using aspect-oriented programming
-
In: Briand, L.C., Williams, C. (eds.), Springer, Heidelberg
-
Pavlich-Mariscal, J.A., Michel, L., Demurjian, S.A.: A formal enforcement framework for role-based access control using aspect-oriented programming. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 537-552. Springer, Heidelberg (2005)
-
(2005)
MoDELS 2005. LNCS
, vol.3713
, pp. 537-552
-
-
Pavlich-Mariscal, J.A.1
Michel, L.2
Demurjian, S.A.3
-
19
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
Ray, I., France, R., Li, N., Georg, G.: An aspect-based approach to modeling access control concerns. Information and Software Technology 46(9), 575-587 (2004)
-
(2004)
Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.2
Li, N.3
Georg, G.4
-
20
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|