메뉴 건너뛰기




Volumn 6542 LNCS, Issue , 2011, Pages 142-155

A tool-supported method for the design and implementation of secure distributed applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION-SPECIFIC MODEL; BEHAVIORAL PROPERTIES; BUILDING BLOCKES; DISTRIBUTED APPLICATIONS; INTEGRATION OF SECURITY; SECURITY FUNCTIONS; SECURITY MECHANISM; COLLABORATIVE BUILDINGS; DESIGN AND IMPLEMENTATIONS;

EID: 79551530717     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19125-1_11     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 77954507186 scopus 로고    scopus 로고
    • Integrating Security and Software Engineering: Advances and Future Vision
    • Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Advances and Future Vision. IGI Global (2006)
    • (2006) IGI Global
    • Mouratidis, H.1    Giorgini, P.2
  • 3
    • 17544394392 scopus 로고    scopus 로고
    • Computer Security in the Real World
    • Lampson, B.W.: Computer Security in the Real World. Computer 37, 37-46 (2004)
    • (2004) Computer , vol.37 , pp. 37-46
    • Lampson, B.W.1
  • 9
    • 71749097369 scopus 로고    scopus 로고
    • Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services
    • Kraemer, F.A., Slåtten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software 82(12), 2068-2080 (2009)
    • (2009) Journal of Systems and Software , vol.82 , Issue.12 , pp. 2068-2080
    • Kraemer, F.A.1    Slåtten, V.2    Herrmann, P.3
  • 10
    • 73349144102 scopus 로고    scopus 로고
    • Automated Encapsulation of UML Activities for Incremental Development and Verification
    • Schürr,A., Selic,B. (eds.)MODELS 2009. Springer, Heidelberg
    • Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Schürr,A., Selic,B. (eds.)MODELS 2009. LNCS, vol. 5795, pp. 571-585. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5795 , pp. 571-585
    • Kraemer, F.A.1    Herrmann, P.2
  • 11
    • 70549113986 scopus 로고    scopus 로고
    • Arctis Website, http://www.arctis.item.ntnu.no/
    • Arctis Website
  • 12
    • 77954646052 scopus 로고    scopus 로고
    • Reactive Semantics for Distributed UML Activities
    • Hatcliff, J., Zucca, E. (eds.) FMOODS 2010. Springer, Heidelberg
    • Kraemer, F.A., Herrmann, P.: Reactive Semantics for Distributed UML Activities. In: Hatcliff, J., Zucca, E. (eds.) FMOODS 2010. LNCS, vol. 6117, pp. 17-31. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6117 , pp. 17-31
    • Kraemer, F.A.1    Herrmann, P.2
  • 14
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 15
    • 29244485874 scopus 로고    scopus 로고
    • Compositionality of Security Protocols: A Research Agenda
    • Cremers, C.: Compositionality of Security Protocols: A Research Agenda. Electronic Notes Theoretical Computer Science 142, 99-110 (2006)
    • (2006) Electronic Notes Theoretical Computer Science , vol.142 , pp. 99-110
    • Cremers, C.1
  • 16
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for Information Systems Development
    • Baskerville, R.: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys 25(4), 375-414 (1993)
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 17
    • 85042869235 scopus 로고    scopus 로고
    • Transforming Collaborative Service Specifications into Efficiently Executable State Machines
    • Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007). EASST
    • Kraemer, F.A., Herrmann, P.: Transforming Collaborative Service Specifications into Efficiently Executable State Machines. In: Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007). Electronic Communications of the EASST, vol. 7. EASST (2007)
    • (2007) Electronic Communications of the EASST , vol.7
    • Kraemer, F.A.1    Herrmann, P.2
  • 18
    • 33845431237 scopus 로고    scopus 로고
    • Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services
    • Meersman, R., Tari, Z. (eds.) OTM 2006. Springer, Heidelberg
    • Kraemer, F.A., Herrmann, P., Bræk, R.: Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol. 4276, pp. 1613-1632. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4276 , pp. 1613-1632
    • Kraemer, F.A.1    Herrmann, P.2    Bræk, R.3
  • 19
    • 85037683165 scopus 로고    scopus 로고
    • SSLEngine from JSSE, http://java.sun.com/javase/6/docs/api/javax/net/ ssl/SSLEngine.html
    • SSLEngine from JSSE
  • 23
    • 33746093610 scopus 로고    scopus 로고
    • Object Management Group: version 1.8, formal/2002- 03-11 March
    • Object Management Group: CORBA Security Service, version 1.8, formal/2002- 03-11 (March 2002)
    • (2002) CORBA Security Service
  • 24
    • 36049039435 scopus 로고    scopus 로고
    • OASIS: version 1.1 February
    • OASIS: Web Services Security, version 1.1 (February 2006)
    • (2006) Web Services Security
  • 29
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
    • Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
    • Cremers, C.J.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 414-418
    • Cremers, C.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.