-
1
-
-
33750059814
-
Towards a security engineering process
-
Orlando, Florida, USA
-
C. Artelsmair, R. Wagner, Towards a security engineering process, in: The 7th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, 2003.
-
(2003)
The 7th World Multiconference on Systemics, Cybernetics and Informatics
-
-
Artelsmair, C.1
Wagner, R.2
-
2
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
5th International Conference on the Unified Modeling Language
-
D. Basin, J. Doser, SecureUML: a UML-based modeling language for model-driven security, in: 5th International Conference on the Unified Modeling Language, Lecture Notes in Computer Science 2460, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2460
-
-
Basin, D.1
Doser, J.2
-
3
-
-
0242625201
-
Model driven security for process-oriented systems
-
ACM Press, Como, Italy
-
Basin D., Doser J., and Lodderstedt T. Model driven security for process-oriented systems. ACM Symposium on Access Control Models and Technologies (2003), ACM Press, Como, Italy
-
(2003)
ACM Symposium on Access Control Models and Technologies
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
4
-
-
77949490048
-
Security and survivability reasoning frameworks and architectural design tactics
-
Bass L., Bachmann F., Ellison R.J., Moore A.P., and Klein M. Security and survivability reasoning frameworks and architectural design tactics. SEI (2004)
-
(2004)
SEI
-
-
Bass, L.1
Bachmann, F.2
Ellison, R.J.3
Moore, A.P.4
Klein, M.5
-
6
-
-
85056980116
-
-
P.G. Bradford, B.M. Grizzell, G.T. Jay, J.T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
-
P.G. Bradford, B.M. Grizzell, G.T. Jay, J.T. Jenkins, Cap. 4. Pragmatic Security for Constrained Wireless Networks, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
-
-
-
-
7
-
-
3142750497
-
TROPOS: an agent-oriented software development methodology
-
Bresciani P., Giorgini P., Giunchiglia F., Mylopoulos J., and Perin A. TROPOS: an agent-oriented software development methodology. Journal of Autonomous Agents and Multi-Agent Systems 8 3 (2004) 203-236
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perin, A.5
-
8
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, V. Lotz, G. Wimmel, Key issues of a formally based process model for security engineering, in: International Conference on Software and Systems Engineering and their Applications, 2003.
-
(2003)
International Conference on Software and Systems Engineering and their Applications
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Lotz, V.6
Wimmel, G.7
-
9
-
-
0012982540
-
A requirements-driven development methodology
-
J. Castro, M. Kolp, J. Mylopoulos, A requirements-driven development methodology, in: 13th Int. Conf. on Advanced Information Systems Engineering, CAiSE'01, 2001.
-
(2001)
13th Int. Conf. on Advanced Information Systems Engineering, CAiSE'01
-
-
Castro, J.1
Kolp, M.2
Mylopoulos, J.3
-
11
-
-
33845456982
-
Scheduling in the grid application development software project
-
H. Dail, O. Sievert, F. Berman, H. Casanova, A. YarKhan, S. Vadhiyar, J. Dongarra, C. Liu, L. Yang, D. Angulo, I. Foster, Scheduling in the grid application development software project, in: Grid Resource Management: State Of The Art And Future Trends, 2004, p. 73-98.
-
(2004)
Grid Resource Management: State Of The Art And Future Trends
, pp. 73-98
-
-
Dail, H.1
Sievert, O.2
Berman, F.3
Casanova, H.4
YarKhan, A.5
Vadhiyar, S.6
Dongarra, J.7
Liu, C.8
Yang, L.9
Angulo, D.10
Foster, I.11
-
12
-
-
37149000358
-
A UML profile for modeling mobile information systems
-
Distributed Applications and Interoperable Systems, DAIS'07
-
V. Dehlen, J.Ø. Aagedal, A UML profile for modeling mobile information systems, in: Distributed Applications and Interoperable Systems - DAIS'07 (LNCS 4531), 2007.
-
(2007)
LNCS
, vol.4531
-
-
Dehlen, V.1
Aagedal, J.Ø.2
-
14
-
-
60849106337
-
Model-driven development for secure information systems
-
Fernández-Medina E., Jurjens J., Trujillo J., and Jajodia S. Model-driven development for secure information systems. Information and Software Technology 51 5 (2009) 809-814
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 809-814
-
-
Fernández-Medina, E.1
Jurjens, J.2
Trujillo, J.3
Jajodia, S.4
-
16
-
-
10644240285
-
The physiology of the grid: An open grid services architecture for distributed systems integration, Open Grid Service Infrastructure WG
-
I. Foster, C. Kesselman, J.M. Nick, S. Tuecke, The physiology of the grid: an open grid services architecture for distributed systems integration, Open Grid Service Infrastructure WG, Global Grid Forum, 2002.
-
(2002)
Global Grid Forum
-
-
Foster, I.1
Kesselman, C.2
Nick, J.M.3
Tuecke, S.4
-
17
-
-
0032218229
-
A security architecture for computational grids
-
ACM Press, San Francisco, USA
-
Foster I., Kesselman C., Tsudik G., and Tuecke S. A security architecture for computational grids. 5th Conference on Computer and Communications Security (1998), ACM Press, San Francisco, USA
-
(1998)
5th Conference on Computer and Communications Security
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
19
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
Georg G., Ray I., Anastasakis K., Bordbar B., Toahchoodee M., and Houmb S.H. An aspect-oriented methodology for designing secure applications. Information and Software Technology 51 5 (2009) 846-864
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
20
-
-
77949491147
-
-
Globus Project
-
Globus Project. .
-
-
-
-
21
-
-
77949490981
-
-
Introduction to the CLASP Process
-
D. Graham, Introduction to the CLASP Process, 2006.
-
(2006)
-
-
Graham, D.1
-
22
-
-
35048852119
-
A UML profile to model mobile systems
-
UML
-
V. Grassi, R. Mirandola, A. Sabetta, A UML profile to model mobile systems, in: UML 2004, LNCS 3273, 2004, p. 128-142.
-
(2004)
LNCS
, vol.3273
, pp. 128-142
-
-
Grassi, V.1
Mirandola, R.2
Sabetta, A.3
-
23
-
-
77949486757
-
-
GREDIA project
-
GREDIA project. .
-
-
-
-
24
-
-
42749098120
-
A grid service infrastructure for mobile devices
-
Beijing, China
-
T. Guan, E. Zaluska, D.D. Roure, A grid service infrastructure for mobile devices, in: First International Conference on Semantics, Knowledge, an Grid (SKG 2005), Beijing, China, 2005.
-
(2005)
First International Conference on Semantics, Knowledge, an Grid (SKG
-
-
Guan, T.1
Zaluska, E.2
Roure, D.D.3
-
25
-
-
68249148138
-
Security requirements for web services based on SIREN
-
Paris, France
-
C. Gutiérrez, E. Fernández-Medina, M. Piattini, Security requirements for web services based on SIREN, in: Symposium on Requirements Engineering for Information Security, Paris, France, 2005.
-
(2005)
Symposium on Requirements Engineering for Information Security
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piattini, M.3
-
26
-
-
34548176547
-
A framework for security requirements engineering
-
Shangai, China
-
C.B. Haley, J.D. Moffet, R. Laney, B. Nuseibeh, A framework for security requirements engineering, in: Software Engineering for Secure Systems Workshop, Shangai, China, 2006.
-
(2006)
Software Engineering for Secure Systems Workshop
-
-
Haley, C.B.1
Moffet, J.D.2
Laney, R.3
Nuseibeh, B.4
-
27
-
-
57649222467
-
-
Lawrence Berkeley National Laboratory, Paper LBNL-54853
-
M. Humphrey, M.R. Thompson, K.R. Jackson, Security for grids, Lawrence Berkeley National Laboratory, Paper LBNL-54853, 2005.
-
(2005)
Security for grids
-
-
Humphrey, M.1
Thompson, M.R.2
Jackson, K.R.3
-
28
-
-
77949489965
-
Quality model
-
ISO/IEC 25010, ISO/IEC 9126-1
-
ISO/IEC 25010, Quality model (ISO/IEC 9126-1), 2009.
-
(2009)
-
-
-
29
-
-
0004020195
-
Information technology - guidelines for the management of IT security - Part 1: Concepts and models for IT Security,
-
ISO/IEC
-
ISO/IEC, Information technology - guidelines for the management of IT security - Part 1: concepts and models for IT Security, 1996.
-
(1996)
-
-
-
30
-
-
77949486183
-
-
ITU, ITU_T Recommendation X.800. Security Architecture for Open Systems Interconnection for CCITT Applications, 1991.
-
ITU, ITU_T Recommendation X.800. Security Architecture for Open Systems Interconnection for CCITT Applications, 1991.
-
-
-
-
32
-
-
33646765853
-
Mobile-to-grid middleware: bridging the gap between mobile and grid environments
-
Springer, Amsterdam, The Netherlands
-
Jameel H., Kalim U., Sajjad A., Lee S., and Jeon T. Mobile-to-grid middleware: bridging the gap between mobile and grid environments. European Grid Conference EGC 2005 (2005), Springer, Amsterdam, The Netherlands
-
(2005)
European Grid Conference EGC 2005
-
-
Jameel, H.1
Kalim, U.2
Sajjad, A.3
Lee, S.4
Jeon, T.5
-
35
-
-
57349126199
-
Model-based security analysis for mobile communications
-
IEEE Computer Society, Leipzig, Germany
-
Jürjens J., Schreck J., and Bartmann P. Model-based security analysis for mobile communications. International Conference on Software Engineering (2008), IEEE Computer Society, Leipzig, Germany
-
(2008)
International Conference on Software Engineering
-
-
Jürjens, J.1
Schreck, J.2
Bartmann, P.3
-
37
-
-
0036037169
-
Using UMLsec and goal trees for secure systems development
-
Jurjens J. Using UMLsec and goal trees for secure systems development. Communications of the ACM 48 5 (2002) 1026-1030
-
(2002)
Communications of the ACM
, vol.48
, Issue.5
, pp. 1026-1030
-
-
Jurjens, J.1
-
39
-
-
77949489841
-
-
G. Kostopoulos, N. Sklavos, O. Koufopavlou, Cap. 10. State-of-the-Art Security in Grid Computing, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
-
G. Kostopoulos, N. Sklavos, O. Koufopavlou, Cap. 10. State-of-the-Art Security in Grid Computing, in Security in Distributed, Grid, Mobile, and Pervasive Computing, A. Publications, Editor, The University of Alabama, Tuscaloosa, USA, 2007, p. 440.
-
-
-
-
42
-
-
0242655790
-
-
Springer, Dresden, Germany
-
Lodderstedt T., Basin D., and Doser J.R. SecureUML: A UML-Based Modeling Language for Model-Driven Security (2002), Springer, Dresden, Germany
-
(2002)
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.R.3
-
44
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
Mellado D., Fernández-Medina E., and Piattini M. A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces 29 2 (2007) 244-253
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
45
-
-
57649231761
-
Security requirements engineering process for software product lines: a case study
-
IEEE Computer Society, Sliema, Malta
-
Mellado D., Fernández-Medina E., and Piattini M. Security requirements engineering process for software product lines: a case study. The Third International Conference on Software Engineering Advances (2008), IEEE Computer Society, Sliema, Malta
-
(2008)
The Third International Conference on Software Engineering Advances
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
48
-
-
77949485265
-
-
OMG, Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0, 2008.
-
OMG, Software & Systems Process Engineering Meta-Model Specification (SPEM) 2.0, 2008.
-
-
-
-
49
-
-
77949486748
-
-
Open Grid Forum, The open grid services architecture, Version 1.5, 2006
-
Open Grid Forum, The open grid services architecture, Version 1.5, 2006.
-
-
-
-
50
-
-
84944683046
-
Security-critical system development with extended use cases
-
IEEE
-
G. Popp, J. Jürjens, G. Wimmel, R. Breu, Security-critical system development with extended use cases, in: Tenth Asia-Pacific Software Engineering Conference (APSEC'03), IEEE, 2003.
-
(2003)
Tenth Asia-Pacific Software Engineering Conference (APSEC'03)
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
51
-
-
78650487448
-
Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application. in 5th International Workshop on Foundations and Practices of UML
-
conjunction with the 28th International Conference on Conceptual Modelling, ER, Gramado, Brasil
-
D.G. Rosado, E. Fernández-Medina, J. López. Applying a UML Extension to build Use Cases diagrams in a secure mobile Grid application. in 5th International Workshop on Foundations and Practices of UML, in: conjunction with the 28th International Conference on Conceptual Modelling, ER 2009, LNCS 5833, Gramado, Brasil, 2009.
-
(2009)
LNCS
, vol.5833
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
53
-
-
70349918315
-
Reusable security use cases for mobile grid environments, in: Workshop on Software Engineering for Secure Systems
-
Vancouver, Canada
-
D.G. Rosado, E. Fernández-Medina, J. López. Reusable security use cases for mobile grid environments, in: Workshop on Software Engineering for Secure Systems, in conjunction with the 31st International Conference on Software Engineering, Vancouver, Canada, 2009.
-
(2009)
conjunction with the 31st International Conference on Software Engineering
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
-
54
-
-
57649240533
-
Engineering process based on grid use cases for mobile grid systems
-
Porto, Portugal
-
D.G. Rosado, E. Fernández-Medina, J. López, M. Piattini, Engineering process based on grid use cases for mobile grid systems. in: The Third International Conference on Software and Data Technologies - ICSOFT 2008, Porto, Portugal, 2008.
-
(2008)
The Third International Conference on Software and Data Technologies - ICSOFT
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
55
-
-
49049090612
-
PSecGCM: process for the development of secure grid computing based systems with mobile devices
-
IEEE Computer Society, Barcelona, Spain
-
Rosado D.G., Fernández-Medina E., López J., and Piattini M. PSecGCM: process for the development of secure grid computing based systems with mobile devices. International Conference on Availability Reliability and Security (ARES 2008) (2008), IEEE Computer Society, Barcelona, Spain
-
(2008)
International Conference on Availability Reliability and Security (ARES 2008)
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
56
-
-
79951496239
-
Towards an UML extension of reusable secure use cases for mobile grid systems
-
submitted for publication
-
D.G. Rosado, E. Fernández-Medina, J. López, M. Piattini, Towards an UML extension of reusable secure use cases for mobile grid systems, IEICE Transactions on Information and Systems, submitted for publication.
-
IEICE Transactions on Information and Systems
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
57
-
-
77954606675
-
-
L. Røstad, An extended misuse case notation: including vulnerabilities and the insider threat, in: XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg
-
L. Røstad, An extended misuse case notation: including vulnerabilities and the insider threat, in: XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg, 2006.
-
(2006)
-
-
-
59
-
-
77949490296
-
-
C. Steel, R. Nagappan, R. Lai, The alchemy of security design methodology, patterns, and reality checks, in: Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management. 2005, Prentice Hall PTR/Sun Micros, p. 1088. (Chapter 8).
-
C. Steel, R. Nagappan, R. Lai, The alchemy of security design methodology, patterns, and reality checks, in: Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management. 2005, Prentice Hall PTR/Sun Micros, p. 1088. (Chapter 8).
-
-
-
-
60
-
-
77955159768
-
Security issues in mobile computing
-
McGraw-Hill Professional (Chapter 18)
-
Talukder A., and Yavagal R. Security issues in mobile computing. Mobile Computing (2006), McGraw-Hill Professional (Chapter 18)
-
(2006)
Mobile Computing
-
-
Talukder, A.1
Yavagal, R.2
-
61
-
-
17844409254
-
Requirements reuse for improving information systems security: a practitioner's approach
-
Toval A., Nicolás J., Moros B., and García F. Requirements reuse for improving information systems security: a practitioner's approach. Requirements Engineering Journal 6 (2002) 205-219
-
(2002)
Requirements Engineering Journal
, vol.6
, pp. 205-219
-
-
Toval, A.1
Nicolás, J.2
Moros, B.3
García, F.4
-
62
-
-
62349117518
-
An engineering process for developing secure data warehouses
-
Trujillo J., Soler E., Fernández-Medina E., and Piattini M. An engineering process for developing secure data warehouses. Information and Software Technology 51 6 (2009) 1033-1051
-
(2009)
Information and Software Technology
, vol.51
, Issue.6
, pp. 1033-1051
-
-
Trujillo, J.1
Soler, E.2
Fernández-Medina, E.3
Piattini, M.4
-
63
-
-
84942318236
-
Security for grid services
-
IEEE Computer Society
-
Welch V., Siebenlist F., Foster I., Bresnahan J., Czajkowski K., Gawor J., Kesselman C., Meder S., Pearlman L., and Tuecke S. Security for grid services. 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12 '03) (2003), IEEE Computer Society
-
(2003)
12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12 '03)
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
-
64
-
-
67349139935
-
On the secure software development process: CLASP. SDL and Touchpoints compared
-
Win B.D., Scandariato R., Buyens K., Grégoire J., and Joosen W. On the secure software development process: CLASP. SDL and Touchpoints compared. Information and Software Technology 51 7 (2009) 1152-1171
-
(2009)
Information and Software Technology
, vol.51
, Issue.7
, pp. 1152-1171
-
-
Win, B.D.1
Scandariato, R.2
Buyens, K.3
Grégoire, J.4
Joosen, W.5
-
65
-
-
33750069781
-
Architectural patterns for enabling application security
-
Monticello, IL, USA
-
J. Yoder, J. Barcalow, Architectural patterns for enabling application security, in: 4th Conference on Patterns Language of Programming (PLop'97), Monticello, IL, USA, 1997.
-
(1997)
4th Conference on Patterns Language of Programming (PLop'97)
-
-
Yoder, J.1
Barcalow, J.2
|