-
1
-
-
84950281940
-
Role-based authorization constraints specification using object constraint language
-
Washington, DC, USA. IEEE Computer Society
-
G-J. Ahn and M.E. Shin. Role-based authorization constraints specification using object constraint language. In WETICE '01: Proceedings of the 10th IEEE International Workshops on Enabling Technologies, pages 157-162, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
WETICE '01: Proceedings of the 10th IEEE International Workshops on Enabling Technologies
, pp. 157-162
-
-
Ahn, G.-J.1
Shin, M.E.2
-
2
-
-
0242276148
-
Consistent and complete access control policies in use cases
-
October
-
K. Alghathbar and D. Wijeskera. Consistent and complete access control policies in use cases. In UML 2003 - The Unified Modeling Language. Model Languages and Applications. 6th International Conference, San Francisco, CA, USA, October 2003, Proceedings, pages 373-387, October 2003.
-
(2003)
UML 2003 - The Unified Modeling Language. Model Languages and Applications. 6th International Conference, San Francisco, CA, USA, October 2003, Proceedings
, pp. 373-387
-
-
Alghathbar, K.1
Wijeskera, D.2
-
4
-
-
2642557987
-
Integrating access control design into the software development process
-
Pasadena, CA, June
-
G. Brose, M. Koch, and K.P. Lohr. Integrating access control design into the software development process. In Proceedings of the sixth biennial world conference on the Integrated Design and Process Technology, IDPT, Pasadena, CA, June 2002.
-
(2002)
Proceedings of the sixth biennial world conference on the Integrated Design and Process Technology, IDPT
-
-
Brose, G.1
Koch, M.2
Lohr, K.P.3
-
5
-
-
0035780486
-
Integrating security design into the software development process for e-commerce systems
-
M-T. Chan and L-F. Kwok. Integrating security design into the software development process for e-commerce systems. Information Management & Computer Security, 9(3):112-122, 2001.
-
(2001)
Information Management & Computer Security
, vol.9
, Issue.3
, pp. 112-122
-
-
Chan, M.-T.1
Kwok, L.-F.2
-
6
-
-
77956336824
-
A formal framework for secure design and constraint checking in UML
-
Washington, DC, Mars
-
T. Doan, L.D. Michel, and S.A. Demurjian. A formal framework for secure design and constraint checking in UML. In Proceedings of the International Symposium on Secure Software Engineering, ISSSE'06, Washington, DC, Mars 2006.
-
(2006)
Proceedings of the International Symposium on Secure Software Engineering, ISSSE'06
-
-
Doan, T.1
Michel, L.D.2
Demurjian, S.A.3
-
10
-
-
77956317466
-
-
Object Management Group. Meta object facility (mof) specification, version 2.0
-
Object Management Group. Meta object facility (mof) specification, version 2.0, 2006.
-
(2006)
-
-
-
11
-
-
77956324846
-
-
Object Management Group. Uml 2.0 ocl specification, version 2.0
-
Object Management Group. Uml 2.0 ocl specification, version 2.0, 2006.
-
(2006)
-
-
-
12
-
-
77956304577
-
-
Object Management Group. Unified modeling language: Superstructure, version 2.1.2
-
Object Management Group. Unified modeling language: Superstructure, version 2.1.2, 2007.
-
(2007)
-
-
-
13
-
-
77955141522
-
Reections on the Object Constraint Language
-
A. Hamie, F. Civello, J. Howse, S. Kent, and R. Mitchell. Reections on the Object Constraint Language. In The Unified Modeling Language, UML'98 -Beyond the Notation. First International Workshop, Mulhouse, France, pages 137-145, 1998.
-
(1998)
The Unified Modeling Language, UML'98-Beyond the Notation. First International Workshop, Mulhouse, France
, pp. 137-145
-
-
Hamie, A.1
Civello, F.2
Howse, J.3
Kent, S.4
Mitchell, R.5
-
15
-
-
35248828504
-
Aspect-oriented programming
-
Springer-Verlag, Berlin, Heidelberg, and New York
-
G. Kiczales, J. Lamping, A. Menhdhekar, C. Maeda, C. Lopes, J-M. Loingtier, and J. Irwin. Aspect-oriented programming. In Proceedings European Conference on Object-Oriented Programming, volume 1241, pages 220-242. Springer-Verlag, Berlin, Heidelberg, and New York, 1997.
-
(1997)
Proceedings European Conference on Object-Oriented Programming
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Menhdhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
16
-
-
77956307942
-
An attempt to combine UML and formal methods to model airport security
-
Luxembourg
-
Y. Ledru, R. Laleau, M. Lemoine, S. Vignes, D. Bert, V. Donzeau-Gouge, C. Dubois, and F. Peureux. An attempt to combine UML and formal methods to model airport security. In Forum of the 18th International Conference on Advanced Information Systems Engineering, pages 47-50, Luxembourg, 2006.
-
(2006)
Forum of the 18th International Conference on Advanced Information Systems Engineering
, pp. 47-50
-
-
Ledru, Y.1
Laleau, R.2
Lemoine, M.3
Vignes, S.4
Bert, D.5
Donzeau-Gouge, V.6
Dubois, C.7
Peureux, F.8
-
17
-
-
79955143136
-
Secureuml: A uml-based modeling language for model-driven security
-
T. Lodderstedt, D. Basin, and J. Doser. Secureuml: A uml-based modeling language for model-driven security. In Proceedings of the International Conference on the Unified Modeling Language, UML'2002, pages 426-441, 2002.
-
(2002)
Proceedings of the International Conference on the Unified Modeling Language, UML'2002
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
18
-
-
23944488270
-
For-lysa: UML for authentication analysis
-
C. Montangero, M. Buchholtz, L. Perrone, and S. Semprini. For-lysa: UML for authentication analysis. In Global Computing: IST/FET International Work-shop, GC'2004, pages 93-106, 2005.
-
(2005)
Global Computing: IST/FET International Work-shop, GC'2004
, pp. 93-106
-
-
Montangero, C.1
Buchholtz, M.2
Perrone, L.3
Semprini, S.4
-
19
-
-
72949121425
-
Socle: Integrated design of software applications and security
-
McLean, VA, USA
-
F. Painchaud, D. Azambre, M. Bergeron, J. Mullins, and R.M. Oarga. Socle: Integrated design of software applications and security. In Proceedings of the 10th International Command and Control Research and Technology Symposium, ICCRTS'2005, McLean, VA, USA, 2005.
-
(2005)
Proceedings of the 10th International Command and Control Research and Technology Symposium, ICCRTS'2005
-
-
Painchaud, F.1
Azambre, D.2
Bergeron, M.3
Mullins, J.4
Oarga, R.M.5
-
22
-
-
84944683046
-
Security-critical system development with extended use cases
-
G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In Proceedings of the 10th Asia-Pacific Software Engineering Conference, APSEC, pages 478-487, 2003.
-
(2003)
Proceedings of the 10th Asia-Pacific Software Engineering Conference, APSEC
, pp. 478-487
-
-
Popp, G.1
Jürjens, J.2
Wimmel, G.3
Breu, R.4
-
23
-
-
85087599701
-
Using parameterized UML to specify and compose access control models
-
Lausanne, Switzerland, November
-
I. Ray, N. Li, D.K. Kim, and R. France. Using parameterized UML to specify and compose access control models. In Proceedings of the 6th IFIP TC-11 WG 11.5 Working Confrence on Integrity and Internal Control in Information Systems, IICIS'03, Lausanne, Switzerland, November 2003.
-
(2003)
Proceedings of the 6th IFIP TC-11 WG 11.5 Working Confrence on Integrity and Internal Control in Information Systems, IICIS'03
-
-
Ray, I.1
Li, N.2
Kim, D.K.3
France, R.4
-
24
-
-
33750940979
-
Security requirement with a uml 2.0 profile
-
Washington, DC, USA. IEEE Computer Society
-
A. Rodriguez, E. Fernandez-Medina, and M. Piattini. Security requirement with a uml 2.0 profile. In ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security, pages 670-677, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 670-677
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
25
-
-
0034969633
-
Beyond stereotyping: Metamodeling approaches for the uml
-
A. Schleicher and B. Westfechtel. Beyond stereotyping: Metamodeling approaches for the uml. In HICSS, 2001.
-
(2001)
HICSS
-
-
Schleicher, A.1
Westfechtel, B.2
-
27
-
-
30644467106
-
Verifiable composition of access control and application features
-
ACM
-
E. Song, R. Reddy, R. France, I. Ray, G. Georg, and R. Alexander. Verifiable composition of access control and application features. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, SAC-MAT'05, pages 120-129. ACM, 2005.
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, SAC-MAT'05
, pp. 120-129
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
-
28
-
-
35248832632
-
Towards a business process-driven framework for security engineering with the UML
-
Bristol, U.K.
-
J.L. Vivas, J.A. Montenegro, and J. Lopez. Towards a business process-driven framework for security engineering with the UML. In Proceedings of the 6th Information Security Conference, ISC'03, pages 381-395, Bristol, U.K., 2003.
-
(2003)
Proceedings of the 6th Information Security Conference, ISC'03
, pp. 381-395
-
-
Vivas, J.L.1
Montenegro, J.A.2
Lopez, J.3
|