-
3
-
-
33750823628
-
Analysis Patterns for the Order and Shipment of a Product
-
Fernandez, E. B., Yuan, X., and Brey, S.: Analysis Patterns for the Order and Shipment of a Product. In: Proceeding of the Pattern Languages of Programs Conference, PLoPOO, (2000). http://hillside.net/plop/2000/
-
(2000)
Proceeding of the Pattern Languages of Programs Conference, PLoPOO
-
-
Fernandez, E.B.1
Yuan, X.2
Brey, S.3
-
11
-
-
22544455788
-
Patterns for application firewalls
-
Delessy-Gassant, N., Fernandez, E.B., Rajput, S., and Larrondo-Petrie, M. M: "Patterns for application firewalls. In: Proceedings of the Pattern Languages of Programs Conference (PLoP2004). http://hillside.net/plop/2004/
-
Proceedings of the Pattern Languages of Programs Conference (PLoP2004)
-
-
Delessy-Gassant, N.1
Fernandez, E.B.2
Rajput, S.3
Larrondo-Petrie, M.M.4
-
12
-
-
84860080088
-
Layers and non-functional patterns
-
Phoenix, Arizona, 10-15March 2003
-
Fernandez, E. B.: Layers and non-functional patterns. In: Proceedings of ChiliPLoP03, Phoenix, Arizona, 10-15March 2003 (2003). http://hillside.net/ chiliplop/2003/
-
(2003)
Proceedings of ChiliPLoP03
-
-
Fernandez, E.B.1
-
15
-
-
0004101993
-
-
Wiley
-
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M.: Pattern-Oriented Software Architecture: A System of Patterns, Vol. 1, Wiley (1996).
-
(1996)
Pattern-Oriented Software Architecture: A System of Patterns
, vol.1
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
16
-
-
0035049246
-
Security challenges for Enterprise Java in an e-business environment
-
Koved, L., Nadalin, A., Nagarathan, N., Pistoia, M., and Schrader, T.: Security challenges for Enterprise Java in an e-business environment. In: IBM Systems Journal, Vol. 40, No. 1, (2001), 130-152.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.1
, pp. 130-152
-
-
Koved, L.1
Nadalin, A.2
Nagarathan, N.3
Pistoia, M.4
Schrader, T.5
-
19
-
-
84958882052
-
Creating security mechanism aspect models from abstract security aspect models
-
October 2003
-
Georg, G., France, R., and Ray, I.: Creating Security Mechanism Aspect Models from Abstract Security Aspect Models. In: Workshop on Critical Systems Development with UML, UML2003, October 2003 (2003) http://www.cs.colostate.edu/- georg/aspectsPub/CSDUML03.pdf
-
(2003)
Workshop on Critical Systems Development with UML, UML2003
-
-
Georg, G.1
France, R.2
Ray, I.3
-
20
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
July 2004
-
Ray, I., France, R. B., Li, N., and Georg, G.: An Aspect-Based Approach to Modeling Access Control Concerns. In: Journal of Information and Software Technology, Vol, 46, No. 9, July 2004, (2004) 575-587, http://www.cs.colostate. edu/-georg/aspectsPub/IST04.pdf
-
(2004)
Journal of Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
21
-
-
78651439663
-
-
Submitted for publication.
-
Fernandez, E. B., Larrondo-Petrie, M. M., Sorgente, T., Rajput, S., and VanHilst, M.: UML-based access control models. Submitted for publication.
-
UML-based Access Control Models
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Rajput, S.4
VanHilst, M.5
-
22
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Springer-Verlag, Berlin Heidelberg New York
-
Lodderstedt, T., Basin, D. A., and Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Proceedings of the 5th International Conference on UML, UML 2002, Lecture Notes in Computer Science, Vol. 2460, Springer-Verlag, Berlin Heidelberg New York (2002) 426-441.
-
(2002)
Proceedings of the 5th International Conference on UML, UML 2002, Lecture Notes in Computer Science
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
23
-
-
78651425057
-
-
Object Management Group
-
Object Management Group, http://www.omg.org/uml
-
-
-
-
24
-
-
77952349147
-
Analyzing security in information systems
-
Porto, Portugal
-
Mouratidis, H., and Giorgini, P.: Analyzing security in information systems. In: Proceedings of the 2nd International Workshop on Security and Information Systems, WOSIS 2004, Porto, Portugal (2004).
-
(2004)
Proceedings of the 2nd International Workshop on Security and Information Systems, WOSIS 2004
-
-
Mouratidis, H.1
Giorgini, P.2
|