![]() |
Volumn , Issue , 2007, Pages 545-546
|
Tools for model-based security engineering: Models vs. code
a
|
Author keywords
code analysis; model based software engineering; refactoring; security; security hardening; UML; verification framework
|
Indexed keywords
ASPECT-ORIENTED PROGRAMMING;
AUTOMATED THEOREM PROVER;
CASE TOOLS;
CODE ANALYSIS;
CRITICAL PARTS;
CRYPTOGRAPHIC PROTOCOLS;
CRYPTOPROTOCOLS;
MODEL-BASED;
OPEN SOURCE FRAMEWORKS;
OPEN SOURCE IMPLEMENTATION;
REFACTORINGS;
SECURE SOCKETS;
SECURITY ENGINEERING;
SECURITY HARDENING;
SECURITY PROPERTIES;
SECURITY REQUIREMENTS;
SECURITY WEAKNESS;
VERIFICATION FRAMEWORK;
VERIFICATION ROUTINES;
AUTOMATION;
COMPUTER AIDED SOFTWARE ENGINEERING;
COMPUTER SOFTWARE SELECTION AND EVALUATION;
COMPUTER SYSTEMS PROGRAMMING;
CRYPTOGRAPHY;
HARDENING;
MODELS;
NETWORK SECURITY;
REUSABILITY;
SECURITY SYSTEMS;
VERIFICATION;
NETWORK PROTOCOLS;
|
EID: 77953981798
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1321631.1321736 Document Type: Conference Paper |
Times cited : (8)
|
References (6)
|