메뉴 건너뛰기




Volumn , Issue , 2009, Pages 126-135

A rigorous approach to uncovering security policy violations in UML designs

Author keywords

[No Author keywords available]

Indexed keywords

MODEL CHECKING; SECURITY SYSTEMS;

EID: 70350143484     PISSN: 27708527     EISSN: 27708535     Source Type: Conference Proceeding    
DOI: 10.1109/ICECCS.2009.16     Document Type: Conference Paper
Times cited : (17)

References (24)
  • 1
    • 85178869032 scopus 로고    scopus 로고
    • Object Management Group, Unified Modeling Language: Superstructure, version 2.0 Final Adopted Standard
    • Object Management Group, Unified Modeling Language: Superstructure, version 2.0 Final Adopted Standard.
  • 3
    • 85178866320 scopus 로고    scopus 로고
    • Ahn, G. and Shin, M. E. 2001. Role-Based Authorization Constraints Specification Using Object Constraint Language. In Proceedings of the 10th IEEE international Workshops on Enabling Technologies: infrastructure For Collaborative Enterprises (June 20 - 22, 2001). WETICE. IEEE Computer Society, Washington, DC, 157-162.
    • Ahn, G. and Shin, M. E. 2001. "Role-Based Authorization Constraints Specification Using Object Constraint Language". In Proceedings of the 10th IEEE international Workshops on Enabling Technologies: infrastructure For Collaborative Enterprises (June 20 - 22, 2001). WETICE. IEEE Computer Society, Washington, DC, 157-162.
  • 4
    • 85178857430 scopus 로고    scopus 로고
    • Epstein, P. and Sandhu, R. 1999. Towards a UML based approach to role engineering. In Proceedings of the Fourth ACM Workshop on Role-Based Access Control (Fairfax, Virginia, United States, October 28 - 29, 1999). RBAC '99. ACM, New York, NY, 135-143. DOI= http://doi.acm.org/10. 1145/319171.319184
    • Epstein, P. and Sandhu, R. 1999. "Towards a UML based approach to role engineering". In Proceedings of the Fourth ACM Workshop on Role-Based Access Control (Fairfax, Virginia, United States, October 28 - 29, 1999). RBAC '99. ACM, New York, NY, 135-143. DOI= http://doi.acm.org/10. 1145/319171.319184
  • 10
    • 36048931368 scopus 로고    scopus 로고
    • USE: A UML-based specification environment for validating UML and OCL
    • Dec
    • Gogolla, M., Büttner, F., and Richters, M. 2007. "USE: A UML-based specification environment for validating UML and OCL". Sci. Comput. Program. 69, 1-3, Dec. 2007.
    • (2007) Sci. Comput. Program , vol.69 , pp. 1-3
    • Gogolla, M.1    Büttner, F.2    Richters, M.3
  • 12
    • 44649149548 scopus 로고    scopus 로고
    • Analyzing and Managing Role-Based Access Control Policies
    • 20, 7 Jul., 924-939. DOI
    • Sohr, K., Drouineaud, M., Ahn, G., and Gogolla, M. 2008. "Analyzing and Managing Role-Based Access Control Policies". IEEE Trans. on Knowl. and Data Eng. 20, 7 (Jul. 2008), 924-939. DOI= http://dx.doi.org/10.1109/ TKDE.2008.28
    • (2008) IEEE Trans. on Knowl. and Data Eng
    • Sohr, K.1    Drouineaud, M.2    Ahn, G.3    Gogolla, M.4
  • 17
    • 33645964601 scopus 로고    scopus 로고
    • Evaluating Access Control Policies Through Model Checking
    • Eighth Information Security Conference ISC'05, Springer-Verlag
    • Nan Zhang, Mark D. Ryan and Dimitar Guelev, "Evaluating Access Control Policies Through Model Checking". Eighth Information Security Conference (ISC'05). Lecture Notes in Computer Science volume 3650, pages 446-460, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3650 , pp. 446-460
    • Zhang, N.1    Ryan, M.D.2    Guelev, D.3
  • 18
    • 85178854862 scopus 로고    scopus 로고
    • Schaad, A., Lotz, V., and Sohr, K. 2006. A model-checking approach to analysing organisational controls in a loan origination process. In Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (Lake Tahoe, California, USA, June 07 - 09, 2006). SACMAT '06. ACM, New York, NY, 139-149. DOI= http://doi.acm.org/10.1145/1133058.1133079
    • Schaad, A., Lotz, V., and Sohr, K. 2006. "A model-checking approach to analysing organisational controls in a loan origination process". In Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies (Lake Tahoe, California, USA, June 07 - 09, 2006). SACMAT '06. ACM, New York, NY, 139-149. DOI= http://doi.acm.org/10.1145/1133058.1133079
  • 20
    • 85178861500 scopus 로고    scopus 로고
    • Ermel, C., Holscher, K., Kuske, S., and Ziemann, P. 2005. Animated Simulation of Integrated UML Behavioral Models Based on Graph Transformation. In Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing (September 20 - 24, 2005). VLHCC. IEEE Computer Society, Washington, DC, 125-133. DOI= http://dx.doi.org/10.1109/ VLHCC.2005.18
    • Ermel, C., Holscher, K., Kuske, S., and Ziemann, P. 2005. "Animated Simulation of Integrated UML Behavioral Models Based on Graph Transformation". In Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing (September 20 - 24, 2005). VLHCC. IEEE Computer Society, Washington, DC, 125-133. DOI= http://dx.doi.org/10.1109/ VLHCC.2005.18
  • 22
    • 85178863922 scopus 로고    scopus 로고
    • Validation of Object Oriented Models Using Animation
    • Proceedings of the Workshop on Object-Oriented Technology June 14, 18, 1999, A. M. Moreira and S. Demeyer, Eds, Springer-Verlag, London
    • Oliver, I. 1999. "Validation of Object Oriented Models Using Animation". In Proceedings of the Workshop on Object-Oriented Technology (June 14 - 18, 1999). A. M. Moreira and S. Demeyer, Eds. Lecture Notes In Computer Science, vol. 1743. Springer-Verlag, London, 375-376.
    • (1999) Lecture Notes In Computer Science , vol.1743 , pp. 375-376
    • Oliver, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.