-
1
-
-
33644965870
-
Grid Interactive Service-oriented Programming Environment
-
presented at, Tsinghua, China, pp
-
R. Kolonay and M. Sobolewski, "Grid Interactive Service-oriented Programming Environment," presented at Concurrent Engineering: The Worldwide Engineering Grid, Tsinghua, China, pp. 97-102, 2004.
-
(2004)
Concurrent Engineering: The Worldwide Engineering Grid
, pp. 97-102
-
-
Kolonay, R.1
Sobolewski, M.2
-
2
-
-
70349895814
-
-
L. Bass, F. Bachmann, R. J. Ellison, A. P. Moore, and M. Klein, Security and survivability reasoning frameworks and architectural design tactics, SEI, 2004.
-
L. Bass, F. Bachmann, R. J. Ellison, A. P. Moore, and M. Klein, "Security and survivability reasoning frameworks and architectural design tactics," SEI, 2004.
-
-
-
-
4
-
-
79955143136
-
-
Dresden, Germany, pp
-
T. Lodderstedt, D. Basin, and J. r. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security," Dresden, Germany, pp. 426-441, 2002.
-
(2002)
SecureUML: A UML-Based Modeling Language for Model-Driven Security
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.R.3
-
5
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
presented at
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, and G.Wimmel, "Key issues of a formally based process model for security engineering," presented at International Conference on Software and Systems Engineering and their Applications, 2003.
-
(2003)
International Conference on Software and Systems Engineering and their Applications
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Lotz, V.6
Wimmel, G.7
-
6
-
-
70350130621
-
A framework for security requirements engineering
-
presented at, Shangai, China, pp
-
C. B. Haley, J. D. Moffet, R. Laney, and B. Nuseibeh, "A framework for security requirements engineering," presented at Software Engineering for Secure Systems Workshop, Shangai, China, pp. 35-42, 2006.
-
(2006)
Software Engineering for Secure Systems Workshop
, pp. 35-42
-
-
Haley, C.B.1
Moffet, J.D.2
Laney, R.3
Nuseibeh, B.4
-
8
-
-
33750059814
-
Towards a Security Engineering Process
-
presented at The, Orlando, Florida, USA
-
C. Artelsmair and R. Wagner, "Towards a Security Engineering Process," presented at The 7th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, 2003.
-
(2003)
7th World Multiconference on Systemics, Cybernetics and Informatics
-
-
Artelsmair, C.1
Wagner, R.2
-
9
-
-
0242625201
-
Model driven security for process-oriented systems
-
presented at, Como, Italy, pp
-
D. Basin, J. Doser, and T. Lodderstedt, "Model driven security for process-oriented systems," presented at ACM Symposium on Access Control Models and Technologies, Como, Italy, pp. 100-109, 2003.
-
(2003)
ACM Symposium on Access Control Models and Technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
11
-
-
0032218229
-
A Security Architecture for Computational Grids
-
presented at, San Francisco, USA, pp
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A Security Architecture for Computational Grids," presented at 5th Conference on Computer and Communications Security, San Francisco, USA, pp. 83-92, 1998.
-
(1998)
5th Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
12
-
-
84887556035
-
Communication paradigms for mobile grid users
-
presented at
-
D. Bruneo, M. Scarpa, A. Zaia, and A. Puliafito, "Communication paradigms for mobile grid users," presented at 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'03). pp. 669-676, 2003.
-
(2003)
3rd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'03)
, pp. 669-676
-
-
Bruneo, D.1
Scarpa, M.2
Zaia, A.3
Puliafito, A.4
-
14
-
-
42749098120
-
A Grid Service Infrastructure for Mobile Devices
-
presented at , Beijing, China
-
T. Guan, E. Zaluska, and D. D. Roure, "A Grid Service Infrastructure for Mobile Devices," presented at First International Conference on Semantics, Knowledge, an Grid (SKG 2005), Beijing, China, 2005.
-
(2005)
First International Conference on Semantics, Knowledge, an Grid (SKG
-
-
Guan, T.1
Zaluska, E.2
Roure, D.D.3
-
15
-
-
24944473223
-
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
-
presented at, Amsterdam, The Netherlands, pp
-
H. Jameel, U. Kalim, A. Sajjad, S. Lee, and T. Jeon, "Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments," presented at European Grid Conference EGC 2005, Amsterdam, The Netherlands, pp. 932-941, 2005.
-
(2005)
European Grid Conference EGC
, pp. 932-941
-
-
Jameel, H.1
Kalim, U.2
Sajjad, A.3
Lee, S.4
Jeon, T.5
-
16
-
-
44349121386
-
Disconnected Operation Service in Mobile Grid Computing
-
Trento, Italy
-
S.-M. Park, Y.-B. Ko, and J.-H. Kim, "Disconnected Operation Service in Mobile Grid Computing," presented at International Conference on Service Oriented Computing (ICSOC'2003), Trento, Italy, 2003.
-
(2003)
presented at International Conference on Service Oriented Computing (ICSOC
-
-
Park, S.-M.1
Ko, Y.-B.2
Kim, J.-H.3
-
18
-
-
38949128674
-
Grid Computing Security: A Taxonomy
-
A. Chakrabarti, A. Damodaran, and S. Sengupta, "Grid Computing Security: A Taxonomy," IEEE Security & Privacy, vol. 6 (1), pp. 44-51, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.1
, pp. 44-51
-
-
Chakrabarti, A.1
Damodaran, A.2
Sengupta, S.3
-
19
-
-
85056980116
-
-
P. G. Bradford, B. M. Grizzell, G. T. Jay, and J. T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Ed. The University of Alabama, Tuscaloosa, USA, pp. 440, 2007.
-
P. G. Bradford, B. M. Grizzell, G. T. Jay, and J. T. Jenkins, "Cap. 4. Pragmatic Security for Constrained Wireless Networks," in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Ed. The University of Alabama, Tuscaloosa, USA, pp. 440, 2007.
-
-
-
-
20
-
-
33845456982
-
Scheduling In The Grid Application Development Software Project
-
H. Dail, O. Sievert, F. Berman, H. Casanova, A. YarKhan, S. Vadhiyar, J. Dongarra, C. Liu, L. Yang, D. Angulo, and I. Foster, "Scheduling In The Grid Application Development Software Project," in Grid resource management:state of the art and future trends, pp. 73-98, 2004.
-
(2004)
Grid resource management:state of the art and future trends
, pp. 73-98
-
-
Dail, H.1
Sievert, O.2
Berman, F.3
Casanova, H.4
YarKhan, A.5
Vadhiyar, S.6
Dongarra, J.7
Liu, C.8
Yang, L.9
Angulo, D.10
Foster, I.11
-
21
-
-
33344465743
-
Model-Driven Engineering
-
D. C. Schmidt, "Model-Driven Engineering," IEEE Computer, vol. 39 (2), 2006.
-
(2006)
IEEE Computer
, vol.39
, Issue.2
-
-
Schmidt, D.C.1
-
24
-
-
17644401409
-
Bringing Security Home: A process for developing secure and usable systems
-
presented at, Ascona, Switzerland
-
I. Flechais, M. A. Sasse, and S. M. V. Hailes, "Bringing Security Home: A process for developing secure and usable systems," presented at Nwe Security Paradigms Workshop (NSPW'03), Ascona, Switzerland, 2003.
-
(2003)
Nwe Security Paradigms Workshop (NSPW'03)
-
-
Flechais, I.1
Sasse, M.A.2
Hailes, S.M.V.3
-
26
-
-
0242403961
-
UMLsec: Extending UML for Secure Systems Development
-
presented at, Dresden, Germany, pp
-
J. Jurjens, "UMLsec: Extending UML for Secure Systems Development," presented at 5th International Conference on the Unified Modeling Language (UML), Dresden, Germany, pp. 1-9, 2002.
-
(2002)
5th International Conference on the Unified Modeling Language (UML)
, pp. 1-9
-
-
Jurjens, J.1
-
27
-
-
33750490069
-
.The Alchemy of Security Design Methodology, Patterns, and Reality Checks
-
C. Steel, R. Nagappan, and R. Lai, "Chapter 8.The Alchemy of Security Design Methodology, Patterns, and Reality Checks," in Core Security Patterns:Best Practices and Strategies for J2EE™, Web Services, and Identity Management: Prentice Hall PTR/Sun Micros, pp. 1088, 2005.
-
(2005)
Core Security Patterns:Best Practices and Strategies for J2EE™, Web Services, and Identity Management: Prentice Hall PTR/Sun Micros
, pp. 1088
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
28
-
-
84944683046
-
Security-Critical System Development with Extended Use Cases
-
presented at
-
G. Popp, J. Jürjens, G. Wimmel, and R. Breu, "Security-Critical System Development with Extended Use Cases," presented at Tenth Asia-Pacific Software Engineering Conference (APSEC'03), 2003.
-
(2003)
Tenth Asia-Pacific Software Engineering Conference (APSEC'03)
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
30
-
-
35048842754
-
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes
-
L. Kwok-Yan, Z. Xi-Bin, C. Siu-Leung, M. Gu, and S. Jia-Guang, "Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes," Lecture Notes in Computer Science, vol. 2908/2003 (pp. 42-54, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2908
, Issue.2003
, pp. 42-54
-
-
Kwok-Yan, L.1
Xi-Bin, Z.2
Siu-Leung, C.3
Gu, M.4
Jia-Guang, S.5
-
31
-
-
0036949030
-
Challenge: Integrating Mobile Wireless Devices Into the Computational Grid
-
presented at, Atlanta, Georgia, USA, pp
-
T. Phan, L. Huang, and C. Dulan, "Challenge: Integrating Mobile Wireless Devices Into the Computational Grid," presented at 8th annual international conference on Mobile computing and networking (MobiCom'02), Atlanta, Georgia, USA, pp. 271-278, 2002.
-
(2002)
8th annual international conference on Mobile computing and networking (MobiCom'02)
, pp. 271-278
-
-
Phan, T.1
Huang, L.2
Dulan, C.3
-
33
-
-
49049090612
-
PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices
-
presented at, Barcelona, Spain, pp
-
D. G. Rosado, E. Fernández-Medina, J. López, and M. Piattini, "PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices," presented at International Conference on Availability, Reliability and Security (ARES'08), Barcelona, Spain, pp. 136-142, 2008.
-
(2008)
International Conference on Availability, Reliability and Security (ARES'08)
, pp. 136-142
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
34
-
-
57649240533
-
Engineering Process Based On Grid Use Cases For Mobile Grid Systems
-
presented at The, Porto, Portugal, pp
-
D. G. Rosado, E. Fernández-Medina, J. López, and M. Piattini, "Engineering Process Based On Grid Use Cases For Mobile Grid Systems," presented at The Third International Conference on Software and Data Technologies- ICSOFT 2008, Porto, Portugal, pp. 146-151, 2008.
-
(2008)
Third International Conference on Software and Data Technologies- ICSOFT
, pp. 146-151
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
35
-
-
77949488225
-
Obtaining Security Requirements for a Mobile Grid System
-
to be published in April 1
-
D. G. Rosado, E. Fernández-Medina, and J. López, "Obtaining Security Requirements for a Mobile Grid System," International Journal of Grid and High Performance Computing, pp. (to be published in April 1, 2009), 2008.
-
(2008)
International Journal of Grid and High Performance Computing
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
36
-
-
77949517037
-
Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0
-
OMG
-
OMG, "Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0," 2008.
-
(2008)
-
-
-
38
-
-
77954606675
-
-
L. Røstad, An extended misuse case notation: Including vulnerabilities and the insider threat, presented at XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg
-
L. Røstad, "An extended misuse case notation: Including vulnerabilities and the insider threat," presented at XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg, 2006.
-
(2006)
-
-
|