-
1
-
-
77954507186
-
Integrating Security and Software Engineering: Advances and Future Vision
-
Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Advances and Future Vision. IGI Global (2006)
-
(2006)
IGI Global
-
-
Mouratidis, H.1
Giorgini, P.2
-
3
-
-
17544394392
-
Computer Security in the Real World
-
Lampson, B.W.: Computer Security in the Real World. Computer 37, 37-46 (2004)
-
(2004)
Computer
, vol.37
, pp. 37-46
-
-
Lampson, B.W.1
-
6
-
-
60849085437
-
An Aspect-Oriented Methodology for Designing Secure Applications. Information and Software Technology
-
Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An Aspect-Oriented Methodology for Designing Secure Applications. Information and Software Technology, Special Issue: Model-Driven Development for Secure Information Systems 51(5), 846-864 (2009)
-
(2009)
Special Issue: Model-Driven Development for Secure Information Systems
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
7
-
-
77952736199
-
Weaving security aspects into uml 2.0 design models
-
ACM, New York
-
Mouheb, D., Talhi, C., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Weaving security aspects into uml 2.0 design models. In: Proceedings of the 13th Workshop on Aspect-Oriented Modeling, AOM 2009, pp. 7-12. ACM, New York (2009)
-
(2009)
Proceedings of the 13th Workshop on Aspect-Oriented Modeling, AOM 2009
, pp. 7-12
-
-
Mouheb, D.1
Talhi, C.2
Lima, V.3
Debbabi, M.4
Wang, L.5
Pourzandi, M.6
-
9
-
-
71749097369
-
Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services
-
Kraemer, F.A., Slåtten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software 82(12), 2068-2080 (2009)
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.12
, pp. 2068-2080
-
-
Kraemer, F.A.1
Slåtten, V.2
Herrmann, P.3
-
10
-
-
73349144102
-
Automated Encapsulation of UML Activities for Incremental Development and Verification
-
Schürr,A., Selic,B. (eds.)MODELS 2009. Springer, Heidelberg
-
Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Schürr,A., Selic,B. (eds.)MODELS 2009. LNCS, vol. 5795, pp. 571-585. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5795
, pp. 571-585
-
-
Kraemer, F.A.1
Herrmann, P.2
-
11
-
-
70549113986
-
-
Arctis Website, http://www.arctis.item.ntnu.no/
-
Arctis Website
-
-
-
12
-
-
77954646052
-
Reactive Semantics for Distributed UML Activities
-
Hatcliff, J., Zucca, E. (eds.) FMOODS 2010. Springer, Heidelberg
-
Kraemer, F.A., Herrmann, P.: Reactive Semantics for Distributed UML Activities. In: Hatcliff, J., Zucca, E. (eds.) FMOODS 2010. LNCS, vol. 6117, pp. 17-31. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6117
, pp. 17-31
-
-
Kraemer, F.A.1
Herrmann, P.2
-
13
-
-
2642548302
-
Secure Protocol Composition
-
ACM, New York
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure Protocol Composition. In: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, FMSE 2003, pp. 11-23. ACM, New York (2003)
-
(2003)
Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, FMSE 2003
, pp. 11-23
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
14
-
-
84880901653
-
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310-331. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 310-331
-
-
Krawczyk, H.1
-
15
-
-
29244485874
-
Compositionality of Security Protocols: A Research Agenda
-
Cremers, C.: Compositionality of Security Protocols: A Research Agenda. Electronic Notes Theoretical Computer Science 142, 99-110 (2006)
-
(2006)
Electronic Notes Theoretical Computer Science
, vol.142
, pp. 99-110
-
-
Cremers, C.1
-
16
-
-
0027804413
-
Information Systems Security Design Methods: Implications for Information Systems Development
-
Baskerville, R.: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys 25(4), 375-414 (1993)
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
17
-
-
85042869235
-
Transforming Collaborative Service Specifications into Efficiently Executable State Machines
-
Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007). EASST
-
Kraemer, F.A., Herrmann, P.: Transforming Collaborative Service Specifications into Efficiently Executable State Machines. In: Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007). Electronic Communications of the EASST, vol. 7. EASST (2007)
-
(2007)
Electronic Communications of the EASST
, vol.7
-
-
Kraemer, F.A.1
Herrmann, P.2
-
18
-
-
33845431237
-
Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services
-
Meersman, R., Tari, Z. (eds.) OTM 2006. Springer, Heidelberg
-
Kraemer, F.A., Herrmann, P., Bræk, R.: Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol. 4276, pp. 1613-1632. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4276
, pp. 1613-1632
-
-
Kraemer, F.A.1
Herrmann, P.2
Bræk, R.3
-
19
-
-
85037683165
-
-
SSLEngine from JSSE, http://java.sun.com/javase/6/docs/api/javax/net/ ssl/SSLEngine.html
-
SSLEngine from JSSE
-
-
-
22
-
-
21644477867
-
Securing Java RMI-Based Distributed Applications
-
IEEE Computer Society, Los Alamitos
-
Li, N., Mitchell, J.C., Tong, D.: Securing Java RMI-Based Distributed Applications. In: Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC 2004, pp. 262-271. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC 2004
, pp. 262-271
-
-
Li, N.1
Mitchell, J.C.2
Tong, D.3
-
23
-
-
33746093610
-
-
Object Management Group: version 1.8, formal/2002- 03-11 March
-
Object Management Group: CORBA Security Service, version 1.8, formal/2002- 03-11 (March 2002)
-
(2002)
CORBA Security Service
-
-
-
24
-
-
36049039435
-
-
OASIS: version 1.1 February
-
OASIS: Web Services Security, version 1.1 (February 2006)
-
(2006)
Web Services Security
-
-
-
26
-
-
33745471209
-
Model Driven Security: From UML Models to Access Control Infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
27
-
-
72849121791
-
Enhancing UML to Model Custom Security Aspects
-
Pavlich-Mariscal, J., Michel, L., Demurjian, S.: Enhancing UML to Model Custom Security Aspects. In: Proceedings of the 11th Workshop on Aspect-Oriented Modeling, AOM 2007 (2007)
-
(2007)
Proceedings of the 11th Workshop on Aspect-Oriented Modeling, AOM 2007
-
-
Pavlich-Mariscal, J.1
Michel, L.2
Demurjian, S.3
-
28
-
-
33750050331
-
-
Wiley Software Patterns Series. John Wiley & Sons, Chichester
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad: Security Patterns: Integrating Security and Systems Engineering. Wiley Software Patterns Series. John Wiley & Sons, Chichester (2006)
-
(2006)
Sommerlad: Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
-
29
-
-
48949088211
-
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
-
Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
-
Cremers, C.J.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.J.1
|