-
2
-
-
77249130054
-
Study and development of a remote biometric authentication protocol
-
B4-04/2003, Consiglio Nazionale delle Ricerche,Istituto di Informatica e Telematica September
-
Viti, C., Bistarelli, S.: Study and development of a remote biometric authentication protocol, Technical Report IIT B4-04/2003, Consiglio Nazionale delle Ricerche,Istituto di Informatica e Telematica (September 2003)
-
(2003)
Technical Report IIT
-
-
Viti, C.1
Bistarelli, S.2
-
3
-
-
18944394652
-
Modelling and Verification of Layered Security Protocols: A Bank Application
-
Anderson, S, Felici, M, Littlewood, B, eds, SAFECOMP 2003, Springer, Heidelberg
-
Grünbauer, J., Hollmann, H., Jürjens, J., Wimmel, G.: Modelling and Verification of Layered Security Protocols: A Bank Application, In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 116-129, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2788
, pp. 116-129
-
-
Grünbauer, J.1
Hollmann, H.2
Jürjens, J.3
Wimmel, G.4
-
4
-
-
20444440807
-
Sound Development of Secure Service-based Systems
-
ACM, New York
-
Deubler, M., Grünbauer, J., Jürjens, J., Wimmel, G.: Sound Development of Secure Service-based Systems. In: 2nd International Conference on Service Oriented Computing (ICSOC 2004), pp. 115-124. ACM, New York (2004)
-
(2004)
2nd International Conference on Service Oriented Computing (ICSOC
, pp. 115-124
-
-
Deubler, M.1
Grünbauer, J.2
Jürjens, J.3
Wimmel, G.4
-
5
-
-
34548787238
-
Model-based Security Engineering of Distributed Information Systems using UMLsec
-
ACM, New York
-
Best, B., Jürjens, J., Nuseibeh, B.: Model-based Security Engineering of Distributed Information Systems using UMLsec, In: 29th International Conference on Software Engineering (ICSE 2007), pp. 581-590, ACM, New York (2007)
-
(2007)
29th International Conference on Software Engineering (ICSE
, pp. 581-590
-
-
Best, B.1
Jürjens, J.2
Nuseibeh, B.3
-
6
-
-
27144534308
-
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development, Engineering of Complex Computer Systems
-
Houmb, S., Georg, G., France, R., Bieman, J., Jürjens, J.: Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development, Engineering of Complex Computer Systems. In: 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2005), pp. 195-204 (2005)
-
(2005)
10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS
, pp. 195-204
-
-
Houmb, S.1
Georg, G.2
France, R.3
Bieman, J.4
Jürjens, J.5
-
8
-
-
0000913573
-
JML: A Notation for Detailed Design
-
ch. 12, pp, Kluwer, Dordrecht
-
Leavens, G., Baker, A., Ruby, C.: JML: A Notation for Detailed Design. In: Behavioral Specifications of Businesses and Systems, ch. 12, pp. 175-188, Kluwer, Dordrecht (1999)
-
(1999)
Behavioral Specifications of Businesses and Systems
, pp. 175-188
-
-
Leavens, G.1
Baker, A.2
Ruby, C.3
-
9
-
-
33845245278
-
Preliminary Design of JML: A Behavioural Interface Specification Language for Java
-
May
-
Leavens, G., Baker, A., Ruby, C.: Preliminary Design of JML: A Behavioural Interface Specification Language for Java. ACM SIGSOFT Software Engineering Notes 31(3) (May 2006)
-
(2006)
ACM SIGSOFT Software Engineering Notes
, vol.31
, Issue.3
-
-
Leavens, G.1
Baker, A.2
Ruby, C.3
-
10
-
-
77249159125
-
-
Leavens, G., Poll, E., Clifton, C., Cheon, Y., Ruby, C., Cok, D., Muller, P., Kiniry, J., Chalin, P.: JML Reference Manual, DRAFT, Release 1.210, 2007/7/01 Ames, Iowa State University
-
Leavens, G., Poll, E., Clifton, C., Cheon, Y., Ruby, C., Cok, D., Muller, P., Kiniry, J., Chalin, P.: JML Reference Manual, DRAFT, Release 1.210, 2007/7/01 Ames, Iowa State University
-
-
-
-
11
-
-
77249169521
-
-
Schmidt, R.: Modellbasierte Sicherheitsanalyse mit UMLsec: ein Biometrisches Zugangskontrollsystem (Model-based Security Analysis with UMLsec: a Biometrie Access Control System) Ludwig-Maxim. Univ. München (2004)
-
Schmidt, R.: Modellbasierte Sicherheitsanalyse mit UMLsec: ein Biometrisches Zugangskontrollsystem (Model-based Security Analysis with UMLsec: a Biometrie Access Control System) Ludwig-Maxim. Univ. München (2004)
-
-
-
-
12
-
-
33750060125
-
Model-based Security Engineering with UML
-
Aldini, A, Gorrieri, R, Martinelli, F, eds, FOSAD 2005, Springer, Heidelberg
-
Jürjens, J.: Model-based Security Engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005, LNCS, vol. 3655, pp. 42-77. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3655
, pp. 42-77
-
-
Jürjens, J.1
-
13
-
-
77249100553
-
A Formal Specification in JML of the Java Security Package
-
December 4-14
-
Agarwal, P., Rubio-Mediano, C., Cheon, Y., Teller, P.: A Formal Specification in JML of the Java Security Package. Computer, Information, and Systems Sciences and Engineering, December 4-14 (2006)
-
(2006)
Computer, Information, and Systems Sciences and Engineering
-
-
Agarwal, P.1
Rubio-Mediano, C.2
Cheon, Y.3
Teller, P.4
-
15
-
-
84986065681
-
Inspections - Some Surprising Findings
-
Glass, R.: Inspections - Some Surprising Findings, Commun. ACM 42(4), 17-19 (1999)
-
(1999)
Commun. ACM
, vol.42
, Issue.4
, pp. 17-19
-
-
Glass, R.1
-
16
-
-
19044375174
-
-
Burdy, L., Cheon, Y., Cok, D., Ernst, M., Kiniry, J., Leavens, G., Rustan, K., Leino, M., Poll, E.: An overview of JML tools and applications, STTT 7(3), 212-232 (2005)
-
(2005)
An overview of JML tools and applications, STTT
, vol.7
, Issue.3
, pp. 212-232
-
-
Burdy, L.1
Cheon, Y.2
Cok, D.3
Ernst, M.4
Kiniry, J.5
Leavens, G.6
Rustan, K.7
Leino, M.8
Poll, E.9
-
17
-
-
77249088946
-
-
JML common tools, December 10 2007
-
JML common tools, December 10 (2007), http://sourceforge.net/projects/ jmlspecs/
-
-
-
-
18
-
-
57849134664
-
Application of Traceability to Maintenance of Secure Software
-
IEEE, Los Alamitos
-
Yu, Y., Jürjens, J., Mylopoulos, J.: Application of Traceability to Maintenance of Secure Software. In: Int. Conf. for Software Maintenance (ICSM). IEEE, Los Alamitos (2008)
-
(2008)
Int. Conf. for Software Maintenance (ICSM)
-
-
Yu, Y.1
Jürjens, J.2
Mylopoulos, J.3
|