메뉴 건너뛰기




Volumn 16, Issue 17, 2010, Pages 2333-2352

Developing a secure mobile Grid system through a UML extension

Author keywords

Secure development; Secure mobile Grid; Security; UML extension; Use Cases

Indexed keywords


EID: 78650294009     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (33)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse Cases: Use Cases with Hostile Intent
    • [Alexander (2003)]
    • [Alexander (2003)] Alexander, I., Misuse Cases: Use Cases with Hostile Intent. IEEE Software, (2003): p. 58-66.
    • (2003) IEEE Software , pp. 58-66
    • Alexander, I.1
  • 3
    • 33750059814 scopus 로고    scopus 로고
    • Towards a Security Engineering Process
    • [Artelsmair and Wagner (2003)], in The 7th World Multiconference on Systemics, Orlando, Florida, USA
    • [Artelsmair and Wagner (2003)] Artelsmair, C. and R. Wagner. Towards a Security Engineering Process. in The 7th World Multiconference on Systemics, Cybernetics and Informatics. (2003). Orlando, Florida, USA.
    • (2003) Cybernetics and Informatics
    • Artelsmair, C.1    Wagner, R.2
  • 13
    • 33646765853 scopus 로고    scopus 로고
    • Mobile-To- Grid Middleware: Bridging the gap between mobile and Grid environments
    • [Jameel, Kalim et al. (2005)], in, Amsterdam, The Netherlands: Springer
    • [Jameel, Kalim et al. (2005)] Jameel, H., U. Kalim, A. Sajjad, S. Lee, and T. Jeon. Mobile-To- Grid Middleware: Bridging the gap between mobile and Grid environments. in European Grid Conference EGC 2005. (2005). Amsterdam, The Netherlands: Springer.
    • (2005) European Grid Conference EGC 2005
    • Jameel, H.1    Kalim, A.2    Sajjad, S.3    Lee, U.4    Jeon, T.5
  • 15
    • 33644965870 scopus 로고    scopus 로고
    • Grid Interactive Serviceoriented Programming Environment
    • [Kolonay and Sobolewski (2004)], in, Tsinghua, China: Press and Springer Verlag
    • [Kolonay and Sobolewski (2004)] Kolonay, R. and M. Sobolewski. Grid Interactive Serviceoriented Programming Environment. in Concurrent Engineering: The Worldwide Engineering Grid. (2004). Tsinghua, China: Press and Springer Verlag.
    • (2004) Concurrent Engineering: The Worldwide Engineering Grid
    • Kolonay, R.1    Sobolewski, M.2
  • 20
    • 67650301844 scopus 로고    scopus 로고
    • USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework
    • [Park (2009)]
    • [Park (2009)] Park, J.H., USF-PAS: Study on Core Security Technologies for Ubiquitous Security Framework. Journal of Universal Computer Science (J.UCS), (2009). 15(5): p. 1065- 1080.
    • (2009) Journal of Universal Computer Science (J.UCS) , vol.15 , Issue.5 , pp. 1065-1080
    • Park, J.H.1
  • 24
    • 79952574576 scopus 로고    scopus 로고
    • Security Services Architecture for Secure Mobile Grid Systems
    • [Rosado, Fernández-Medina et al. (2010a)], Special Issue on Security and Dependability Assurance of Software Architectures
    • [Rosado, Fernández-Medina et al. (2010a)] Rosado, D.G., E. Fernández-Medina, and J. López, Security Services Architecture for Secure Mobile Grid Systems. Journal of Systems Architecture. Special Issue on Security and Dependability Assurance of Software Architectures, (2010a).
    • (2010) Journal of Systems Architecture
    • Rosado, D.G.1    Fernández-Medina, E.2    López, J.3
  • 26
    • 49049090612 scopus 로고    scopus 로고
    • PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices
    • [Rosado, Fernández-Medina et al. (2008b)], in, Barcelona, Spain: IEEE Computer Society
    • [Rosado, Fernández-Medina et al. (2008b)] Rosado, D.G., E. Fernández-Medina, J. López, and M. Piattini. PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices. in International Conference on Availability, Reliability and Security (ARES 2008). (2008b). Barcelona, Spain: IEEE Computer Society.
    • (2008) International Conference on Availability, Reliability and Security (ARES 2008)
    • Rosado, D.G.1    Fernández-Medina J.López, E.2    Piattini, M.3
  • 27
    • 77949490964 scopus 로고    scopus 로고
    • Analysis of Secure Mobile Grid Systems: A Systematic Approach
    • [Rosado, Fernández-Medina et al. (2010b)]
    • [Rosado, Fernández-Medina et al. (2010b)] Rosado, D.G., E. Fernández-Medina, J. López, and M. Piattini, Analysis of Secure Mobile Grid Systems: A Systematic Approach. Information and Software Technology, (2010b). 52: p. 517-536.
    • (2010) Information and Software Technology , vol.52 , pp. 517-536
    • Rosado, D.G.1    Fernández-Medina J.López, E.2    Piattini, M.3
  • 28
    • 33750441515 scopus 로고    scopus 로고
    • Security Patterns and Requirements for Internet-based Applications
    • [Rosado, Gutiérrez et al. (2006)]
    • [Rosado, Gutiérrez et al. (2006)] Rosado, D.G., C. Gutiérrez, E. Fernandez-Medina, and M. Piattini, Security Patterns and Requirements for Internet-based Applications. Internet Research, (2006). 16(5): p. 519-536.
    • (2006) Internet Research , vol.16 , Issue.5 , pp. 519-536
    • Rosado, D.G.1    Gutiérrez, E.2    Fernandez-Medina, C.3    Piattini, M.4
  • 30
    • 58149107875 scopus 로고    scopus 로고
    • Capturing Security Requirements by Misuse Cases
    • [Sindre and Opdahl (2001)], in, Tromsø, Norway
    • [Sindre and Opdahl (2001)] Sindre, G. and A.L. Opdahl. Capturing Security Requirements by Misuse Cases. in 14th Norwegian Informatics Conference (NIK'2001). (2001). Tromsø, Norway.
    • (2001) 14th Norwegian Informatics Conference (NIK'2001)
    • Sindre, G.1    Opdahl, A.L.2
  • 32
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • [Sindre and Opdahl (2005)]
    • [Sindre and Opdahl (2005)] Sindre, G. and A.L. Opdahl, Eliciting security requirements with misuse cases. Requirements Engineering Journal, (2005). 10(1): p. 34-44.
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 33
    • 0005505737 scopus 로고    scopus 로고
    • [WAP Forum (2001)] WAP Forum, Available from
    • [WAP Forum (2001)] WAP Forum. Wireless Transport Layer Security specification. 2001; Available from: http://www.openmobilealliance.org/tech/affiliates/wap/wap-261-wtls- 20010406-a.pdf.
    • (2001) Wireless Transport Layer Security specification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.