-
2
-
-
60849104397
-
Automated analysis of security-design models
-
doi:10.1016/j.infsof.2008.05.011
-
Basin D, Clavel M, Doser J, Egea M (2009) Automated analysis of security-design models. Inf Softw Technol 51(5): 815-831. doi: 10. 1016/j. infsof. 2008. 05. 011.
-
(2009)
Inf Softw Technol
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
3
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1): 39-91 http://doi. acm. org/10. 1145/1125808. 1125810.
-
(2006)
ACM Trans Softw Eng Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
4
-
-
25144441754
-
Reasoning on UML class diagrams
-
doi:10.1016/j.artint.2005.05.003
-
Berardi D, Calvanese D, Giacomo GD (2005) Reasoning on UML class diagrams. Artificial Intelligence 168: 70-118. doi: 10. 1016/j. artint. 2005. 05. 003.
-
(2005)
Artificial Intelligence
, vol.168
, pp. 70-118
-
-
Berardi, D.1
Calvanese, D.2
Giacomo, G.D.3
-
5
-
-
67650187962
-
From access control policies to aspect code: A metamodel-based approach
-
Workshops and Symposia at MODELS 2008, 28 Sept-3 Oct 2008, Toulouse, France. Lecture Notes on Computer Science, 10.1007/978-3-642-01648-6_26, M. R. V. Chaudron (Ed.), Berlin: Springer
-
Braga C (2008) From access control policies to aspect code: a metamodel-based approach. In: Chaudron MRV (eds) Proceedings of the 11th international conference on model driven engineering languages and systems (MODELS 2008). Workshops and Symposia at MODELS 2008, 28 Sept-3 Oct 2008, Toulouse, France. Lecture notes on computer science, vol 5421. Springer, Berlin, pp 243-256. doi: 10. 1007/978-3-642-01648-6_26.
-
(2008)
Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MODELS 2008)
, pp. 243-256
-
-
Braga, C.1
-
6
-
-
33750286091
-
A model transformation semantics and analysis methodology for Secure UML
-
Genova, Italy, 1-6 Oct. Lecture Notes on Computer Science, O. Nierstrasz, J. Whittle, D. Harel, and G. Reggio (Eds.), Berlin: Springer
-
Brucker AD, Doser J, Wolff B (2006) A model transformation semantics and analysis methodology for Secure UML. In: Nierstrasz O, Whittle J, Harel D, Reggio G (eds) Proceedings of the 9th international conference on model driven engineering languages and systems, Genova, Italy, 1-6 Oct. Lecture notes on computer science, vol 4199. Springer, Berlin, pp 306-320.
-
(2006)
Proceedings of the 9th International Conference on Model Driven Engineering Languages and Systems
, vol.4199
, pp. 306-320
-
-
Brucker, A.D.1
Doser, J.2
Wolff, B.3
-
7
-
-
38049032894
-
Description logic framework for access control and security in object-oriented systems
-
Springer, Berlin, doi: 10.1007/978-3-540-72530-5_68
-
Chae JH, Shiri N (2007) Description logic framework for access control and security in object-oriented systems. In: RSFDGrC '07. Proceedings of the 11th international conference on rough sets, fuzzy sets, data mining and granular computing. Springer, Berlin, pp 565-573. doi: 10. 1007/978-3-540-72530-5_68.
-
(2007)
RSFDGrC '07. Proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing
, pp. 565-573
-
-
Chae, J.H.1
Shiri, N.2
-
9
-
-
70349862227
-
Model-driven security in practice: An industrial experience
-
Fourth European conference on model driven architecture, foundations and applications, Berlin, Germany. Lecture notes on computer science, 9-12 June, Springer, Berlin. doi: 10. 1007/978-3-540-69100-6_22
-
Clavel M, da Silva V, Braga C, Egea M (2008) Model-driven security in practice: an industrial experience. In: Proceedings of ECMDA 2008. Fourth European conference on model driven architecture, foundations and applications, Berlin, Germany. Lecture notes on computer science, 9-12 June, vol 5095. Springer, Berlin. doi: 10. 1007/978-3-540-69100-6_22.
-
(2008)
Proceedings of ECMDA 2008
, vol.5095
-
-
Clavel, M.1
da Silva, V.2
Braga, C.3
Egea, M.4
-
11
-
-
71049147241
-
A temporal description logic based access control model for expressing history constrained policies in semantic web
-
In: IEEE International Workshop on
-
Faghih F, Amini M, Jalili R (2009) A temporal description logic based access control model for expressing history constrained policies in semantic web. Policies for distributed systems and networks. In: IEEE International Workshop on 0: 142-149. http://doi. ieeecomputersociety. org/10. 1109/POLICY. 2009. 15.
-
(2009)
Policies for Distributed Systems and Networks
, pp. 142-149
-
-
Faghih, F.1
Amini, M.2
Jalili, R.3
-
12
-
-
0141911037
-
-
2, Norwood, MA, USA: Artech House Publishers
-
Ferraiolo DF, Kuhn DR, Chandramouli R (2007) Role-based access control, 2nd edn. Artech House Publishers, Norwood, MA, USA.
-
(2007)
Role-Based Access Control
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
13
-
-
0003258017
-
Logics of time and computation
-
2nd edn, Center for the Study of Language and Information
-
Goldblatt R (1987) Logics of time and computation, 2nd edn. In: CSLI Lecture Notes, vol 7. Center for the Study of Language and Information.
-
(1987)
CSLI Lecture Notes
, vol.7
-
-
Goldblatt, R.1
-
15
-
-
47849108986
-
Using description logic and rules to determine xml access control
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/DEXA. 2007. 147
-
Shields B, Molloy O (2007) Using description logic and rules to determine xml access control. In: DEXA '07. Proceedings of the 18th international conference on database and expert systems applications. IEEE Computer Society, Washington, DC, USA, pp 718-724. doi: 10. 1109/DEXA. 2007. 147.
-
(2007)
DEXA '07. Proceedings of the 18th International Conference on Database and Expert Systems Applications
, pp. 718-724
-
-
Shields, B.1
Molloy, O.2
|