메뉴 건너뛰기




Volumn 29, Issue 7, 2010, Pages 770-784

A framework for security assurance of access control enforcement code

Author keywords

Access control; Formal methods; Security assurance; UML

Indexed keywords

ACCESS CONTROL POLICIES; APPLICATION CODES; ASPECT-ORIENTED; ENFORCEMENT MECHANISMS; INTEGRAL PART; LABELED TRANSITION SYSTEMS; SECURITY ASSURANCE; SIMULATION RELATION; SOFTWARE DEVELOPMENT PROCESS; STRUCTURAL OPERATIONAL SEMANTICS; UML;

EID: 77956395450     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.03.004     Document Type: Article
Times cited : (14)

References (38)
  • 7
    • 34250628463 scopus 로고    scopus 로고
    • Combining software transactional memory with a domain modeling language to simplify web application development
    • ACM New York, NY, USA
    • Ao Cachopo Jo, and António Rito-Silva Combining software transactional memory with a domain modeling language to simplify web application development ICWE '06: Proceedings of the 6th international conference on Web engineering 2006 ACM New York, NY, USA 297 304
    • (2006) ICWE '06: Proceedings of the 6th International Conference on Web Engineering , pp. 297-304
    • Cachopo Jo, A.1    Rito-Silva, A.2
  • 18
    • 58049168224 scopus 로고    scopus 로고
    • Toward a reusable and generic security aspect library
    • AOSD
    • M. Huang, C. Wang, and L. Zhang Toward a reusable and generic security aspect library AOSDSEC vol. 4 2004 AOSD
    • (2004) AOSDSEC , vol.4
    • Huang, M.1    Wang, C.2    Zhang, L.3
  • 20
    • 77956393140 scopus 로고    scopus 로고
    • ISO/IEC 14882:2003: Programming languages: C++. 2003
    • ISO/IEC 14882:2003: Programming languages: C++. 2003.
  • 22
    • 38549115493 scopus 로고    scopus 로고
    • A framework for establishing formal conformance between object models and object-oriented programs
    • Tiago Massoni, Rohit Gheyi, and Paulo Borba A framework for establishing formal conformance between object models and object-oriented programs Electronic Notes on Theoretical Computer Science 195 2008 189 209
    • (2008) Electronic Notes on Theoretical Computer Science , vol.195 , pp. 189-209
    • Massoni, T.1    Gheyi, R.2    Borba, P.3
  • 23
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The DIMACS software security workshop
    • G. McGraw From the ground up: the DIMACS software security workshop IEEE Security & Privacy 1 2003 59 66
    • (2003) IEEE Security & Privacy , vol.1 , pp. 59-66
    • McGraw, G.1
  • 28
    • 0013239426 scopus 로고    scopus 로고
    • Providing fine-grained access control for mobile programs through binary editing
    • Pandey R, Hashii B. Providing fine-grained access control for mobile programs through binary editing. Technical Report TR-98-08, 1998.
    • (1998) Technical Report TR-98-08
    • Pandey, R.1    Hashii, B.2
  • 29
    • 77949562741 scopus 로고    scopus 로고
    • A framework of composable access control features: Preserving separation of access control concerns from models to code
    • Jaime A. Pavlich-Mariscal, A. StevenDemurjian, and Laurent D. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Computers and Security 2010 (Special Issue on Software Engineering)
    • (2010) Computers and Security
    • Pavlich-Mariscal, J.A.1    Stevendemurjian, A.2    Michel, L.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.