-
1
-
-
33751113935
-
Validating the enforcement of access control policies and separation of duty principle in requirement engineering
-
Alghathbar K. Validating the enforcement of access control policies and separation of duty principle in requirement engineering. Information and Software Technology 49 2 (2007) 142-157
-
(2007)
Information and Software Technology
, vol.49
, Issue.2
, pp. 142-157
-
-
Alghathbar, K.1
-
10
-
-
14944348412
-
-
Addison-Wesley
-
Budinsky F., Steinberg D., Merks E., Ellersick R., and Grose T.J. Eclipse modeling framework (2004), Addison-Wesley
-
(2004)
Eclipse modeling framework
-
-
Budinsky, F.1
Steinberg, D.2
Merks, E.3
Ellersick, R.4
Grose, T.J.5
-
11
-
-
0033203848
-
Subject-oriented design: Towards improved alignment of requirements, design, and code
-
Clarke S, Harrison W, Ossher H, Tarr P. Subject-oriented design: towards improved alignment of requirements, design, and code. In: Proceedings of OOPSLA 1999, 1999.
-
(1999)
Proceedings of OOPSLA
-
-
Clarke, S.1
Harrison, W.2
Ossher, H.3
Tarr, P.4
-
12
-
-
77949547568
-
-
Analyzing security advice in functional aspect-oriented programming languages. PhD thesis, Princeton, NJ, USA
-
Daniel S. Dantas. Analyzing security advice in functional aspect-oriented programming languages. PhD thesis, Princeton, NJ, USA, 2007.
-
(2007)
-
-
Dantas, D.S.1
-
14
-
-
77949557782
-
-
De-Win B. Engineering application-level security through aspect-oriented software development. PhD thesis, Department of Computer Science, K.U.Leuven, Leuven, Belgium; 2004.
-
De-Win B. Engineering application-level security through aspect-oriented software development. PhD thesis, Department of Computer Science, K.U.Leuven, Leuven, Belgium; 2004.
-
-
-
-
16
-
-
77949551433
-
-
DoD. Trusted computer system evaluation criteria. 5200.28-STD. DoD; 1985.
-
DoD. Trusted computer system evaluation criteria. 5200.28-STD. DoD; 1985.
-
-
-
-
17
-
-
77949554779
-
-
Ellis HJ, Phillips C, Liebrand M, Ting TC. Role delegation for a distributed, unified RBAC/MAC. In: Proceedings of sixteenth annual IFIP WG 11.3 working conference on data and application security; 2002.
-
Ellis HJ, Phillips C, Liebrand M, Ting TC. Role delegation for a distributed, unified RBAC/MAC. In: Proceedings of sixteenth annual IFIP WG 11.3 working conference on data and application security; 2002.
-
-
-
-
20
-
-
84940110094
-
-
Evans David, Twyman Andrew. Flexible policy-directed code safety. In: Security and Privacy, IEEE Symposium on, 0; 1999, p. 0032.
-
Evans David, Twyman Andrew. Flexible policy-directed code safety. In: Security and Privacy, IEEE Symposium on, vol. 0; 1999, p. 0032.
-
-
-
-
23
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo D., Sandhu R., Gavrila S., Kuhn D., and Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4 (2001) 224-274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
25
-
-
0003880013
-
-
Addison-Wesley, Reading, MA
-
Gamma E., Helm R., Johnson R., and Vlissides J. Design patterns: elements of reusable object-oriented software (1995), Addison-Wesley, Reading, MA
-
(1995)
Design patterns: elements of reusable object-oriented software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
26
-
-
0003974377
-
-
Prentice-Hall, Inc, Upper Saddle River, NJ, USA
-
Henderson-Sellers B. Object-oriented metrics: measures of complexity (1995), Prentice-Hall, Inc, Upper Saddle River, NJ, USA
-
(1995)
Object-oriented metrics: measures of complexity
-
-
Henderson-Sellers, B.1
-
28
-
-
77949542751
-
-
Huang M, Wang C, Zhang L. Toward a reusable and generic security aspect library. In: AOSD: AOSDSEC, 4; 2004.
-
Huang M, Wang C, Zhang L. Toward a reusable and generic security aspect library. In: AOSD: AOSDSEC, vol. 4; 2004.
-
-
-
-
30
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Lamport L. Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering 3 2 (1977) 125-143
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
32
-
-
84861670663
-
An Aspect-Oriented approach for software security hardening: from design to implementation
-
Elsevier Science Publishers
-
Mouheb D., Talhi C., Azzam M., Lima V., and Debbabi M. An Aspect-Oriented approach for software security hardening: from design to implementation. The 8th International Conference on Software Methodologies, Tools and Techniques, SOMET'2009 (2009), Elsevier Science Publishers
-
(2009)
The 8th International Conference on Software Methodologies, Tools and Techniques, SOMET'2009
-
-
Mouheb, D.1
Talhi, C.2
Azzam, M.3
Lima, V.4
Debbabi, M.5
-
38
-
-
77949551568
-
-
OMG. UML 2.0 Object Constraint Language (OCL) Specification, 2003.
-
OMG. UML 2.0 Object Constraint Language (OCL) Specification, 2003.
-
-
-
-
40
-
-
0015482049
-
On the criteria to be used in decomposing systems into modules
-
Parnas D. On the criteria to be used in decomposing systems into modules. Communications ACM 15 (1972) 1053-1058
-
(1972)
Communications ACM
, vol.15
, pp. 1053-1058
-
-
Parnas, D.1
-
41
-
-
26444453610
-
-
Pavlich-Mariscal J, Doan T, Michel L, Demurjian S, Ting TC. Role-slices: a notation for RBAC permission assignment and enforcement. In: Proceedings of 19th annual IFIP WG 11.3 working conference on data and applications security, 3654 of Lecture notes in computer science; 2005a, pp 40-53.
-
Pavlich-Mariscal J, Doan T, Michel L, Demurjian S, Ting TC. Role-slices: a notation for RBAC permission assignment and enforcement. In: Proceedings of 19th annual IFIP WG 11.3 working conference on data and applications security, vol. 3654 of Lecture notes in computer science; 2005a, pp 40-53.
-
-
-
-
42
-
-
33646186281
-
A formal enforcement framework for role-based access control using aspect-oriented programming
-
ACM/IEEE 8th international conference on model driven engineering languages and systems, of
-
Pavlich-Mariscal J, Michel L, Demurjian S. A formal enforcement framework for role-based access control using aspect-oriented programming. In: ACM/IEEE 8th international conference on model driven engineering languages and systems, vol. 3713 of Lecture Notes in computer science; 2005b, pp. 537-552.
-
(2005)
Lecture Notes in computer science
, vol.3713
, pp. 537-552
-
-
Pavlich-Mariscal, J.1
Michel, L.2
Demurjian, S.3
-
46
-
-
77949549866
-
-
Ray I, Li N, Kim D, France R. Using parameterized UML to specify and compose access control models. In: Proceedings of the 6th IFIP TC-11 WG 11.5 working conference on integrity and internal control in information systems; 2003.
-
Ray I, Li N, Kim D, France R. Using parameterized UML to specify and compose access control models. In: Proceedings of the 6th IFIP TC-11 WG 11.5 working conference on integrity and internal control in information systems; 2003.
-
-
-
-
47
-
-
84944683046
-
Security-critical system development with extended use cases
-
IEEE Computer Society, Los Alamitos, CA, USA
-
Popp G., Jurjens J., Wimmel G., and Breu R. Security-critical system development with extended use cases. Asia-Pacific Software Engineering Conference vol 0 (2003), IEEE Computer Society, Los Alamitos, CA, USA 478
-
(2003)
Asia-Pacific Software Engineering Conference
, pp. 478
-
-
Popp, G.1
Jurjens, J.2
Wimmel, G.3
Breu, R.4
-
50
-
-
0027699087
-
Lattice-based access control models
-
Sandhu R.S. Lattice-based access control models. IEEE Computer 26 11 (1993) 9-19
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
51
-
-
33244468169
-
On the reuse and maintenance of aspect-oriented software: An assessment framework
-
Sant'Anna C, Garcia A, Chavez C, Lucena C, von Staa A. On the reuse and maintenance of aspect-oriented software: an assessment framework. In: Proceedings of Brazilian symposium on software engineering; 2003, pp. 19-34.
-
(2003)
Proceedings of Brazilian symposium on software engineering
, pp. 19-34
-
-
Sant'Anna, C.1
Garcia, A.2
Chavez, C.3
Lucena, C.4
von Staa, A.5
-
52
-
-
67650680282
-
Aspects and class-based security: a survey of interactions between advice weaving and the java 2 security model
-
ACM, New York, NY, USA
-
Sewe A., Bockisch C., and Mezini M. Aspects and class-based security: a survey of interactions between advice weaving and the java 2 security model. VMIL '08: Proceedings of the 2nd workshop on virtual machines and intermediate languages for emerging modularization mechanisms (2008), ACM, New York, NY, USA 1-7
-
(2008)
VMIL '08: Proceedings of the 2nd workshop on virtual machines and intermediate languages for emerging modularization mechanisms
, pp. 1-7
-
-
Sewe, A.1
Bockisch, C.2
Mezini, M.3
-
53
-
-
37349054742
-
An aspect-oriented security framework
-
Washington, DC, USA;
-
Shah V, Hill F. An aspect-oriented security framework. In Proceedings of DARPA information survivability conference and exposition (DISCEX'03), vol. 2, Washington, DC, USA; 2003, pp. 143-145.
-
(2003)
Proceedings of DARPA information survivability conference and exposition (DISCEX'03)
, vol.2
, pp. 143-145
-
-
Shah, V.1
Hill, F.2
-
56
-
-
30644467106
-
Verifiable composition of access control features and applications
-
Song E, Reddy R, France R, Ray I, Georg G, Alexander R. Verifiable composition of access control features and applications. In: Proceedings of SACMAT 2005; 2005.
-
(2005)
Proceedings of SACMAT
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
-
58
-
-
1842458587
-
The impact of inheritance on security in object-oriented database systems
-
Spooner D. The impact of inheritance on security in object-oriented database systems. In: Database security II: status and prospects; 1989.
-
(1989)
Database security II: Status and prospects
-
-
Spooner, D.1
-
62
-
-
0242613528
-
Application information security semantics: A case of mental health delivery
-
Ting TC. Application information security semantics: a case of mental health delivery. In: Database security III: status and prospects; 1990.
-
(1990)
Database security III: Status and prospects
-
-
Ting, T.C.1
-
64
-
-
34548737170
-
A static verification framework for secure Peer-to-Peer applications
-
IEEE Computer Society, Los Alamitos, CA, USA
-
Zisman A. A static verification framework for secure Peer-to-Peer applications. Internet and web applications and services, international conference on vol. 0 (2007), IEEE Computer Society, Los Alamitos, CA, USA 8
-
(2007)
Internet and web applications and services, international conference on
, pp. 8
-
-
Zisman, A.1
|