-
2
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt. Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology, 15(1):39-91, 2006. (Pubitemid 43947939)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
0003400251
-
Secure computer systems: A mathematical model
-
Mitre Corporation, Bedford, Massachusetts
-
D.E. Bell and L. LaPadula. Secure computer systems: A mathematical model. Technical Report MTR-2547, Volume I & II, Mitre Corporation, Bedford, Massachusetts, 1973.
-
(1973)
Technical Report MTR-2547
, vol.1-2
-
-
Bell, D.E.1
LaPadula, L.2
-
4
-
-
79952843400
-
-
International Business Machines Corporation Administration. Available at
-
International Business Machines Corporation. IBM WebSphere Portal version 6.0, Administration. Available at http://publib.boulder.ibm.com/infocenter/ wpdoc/v6r0/topic/com.ibm.wp.ent.doc/wp-admin-pdf.pdf.
-
IBM WebSphere Portal Version 6.0
-
-
-
5
-
-
27644540336
-
On modelling access policies: Relating roles to their organisational context
-
Proceedings - 13th IEEE International Conference on Requirements Engineering, RE 2005
-
R. Crook, D. Ince, and B. Nuseibeh. On modelling access policies: Relating roles to their organisational context. In Proceedings of 13th IEEE International Requirements Engineering Conference, pages 157-166, 2005. (Pubitemid 41563786)
-
(2005)
Proceedings of the IEEE International Conference on Requirements Engineering
, pp. 157-166
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
6
-
-
20444505719
-
MAC and UML for secure software design
-
FMSE'04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
-
T. Doan, S. Demurjian, T.C. Ting, and A. Ketterl. MAC and UML for secure software design. In Proceedings of 2004 ACM workshop on Formal methods in security engineering (FMSE'04), pages 75-85, 2004. (Pubitemid 40821076)
-
(2004)
FMSE'04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
9
-
-
84944220091
-
Towards Development of Secure Systems Using UMLsec
-
Fundamental Approaches to Software Engineering
-
J. Jürjens. Towards development of secure systems using UMLsec. In Proceedings of 4th International Conference on Fundamental Approaches to Software Engineering (FASE/ETAPS'01), volume 2029 of LNCS, pages 187-200, 2001. (Pubitemid 33256474)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2029
, pp. 187-200
-
-
Jurjens, J.1
-
10
-
-
0013137299
-
-
Object Management Group version 2.2, 2010. OMG Document Number: formal/2010-02-01
-
Object Management Group. Object constraint language, version 2.2, 2010. OMG Document Number: formal/2010-02-01.
-
Object Constraint Language
-
-
-
11
-
-
50949102921
-
-
Object Management Group version 2.3, 2010. OMG Document Number: formal/2010-05-03
-
Object Management Group. OMG Unified Modeling Language, version 2.3, 2010. OMG Document Number: formal/2010-05-03.
-
OMG Unified Modeling Language
-
-
-
12
-
-
77949562741
-
A framework of composable access control features: Preserving separation of access control concerns from models to code
-
J. Pavlich-Mariscal, S. Demurjian, and L. Michel. A framework of composable access control features: Preserving separation of access control concerns from models to code. Computers & Security, 29(3):350-379, 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.3
, pp. 350-379
-
-
Pavlich-Mariscal, J.1
Demurjian, S.2
Michel, L.3
-
14
-
-
84964853055
-
Access Control: Policies, Models, and Mechanisms
-
Foundations of Security Analysis and Design
-
Pierangela Samarati and Sabrina De Capitani di Vimer-cati. Access control: Policies, models, and mechanisms. I n Foundations of Security Ananlysis and Design, volume 2172 of LNCS, pages 137-196. Springer-Verlag, 2001. (Pubitemid 33364380)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2171
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
15
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E.J. Coyne, H. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.3
Youman, C.E.4
-
16
-
-
0028513932
-
Access control: Principles and practice
-
R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Communications, 32(9):40-48, 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
18
-
-
33749080076
-
Attributed Based Access Control (ABAC) for web services
-
DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
-
E. Yuan and J. Tong. Attributed based access control (ABAC) for web services. In Proceedings of IEEE International Conference on Web Services (ICWS'05), pages 561-569, 2005. (Pubitemid 44460249)
-
(2005)
Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
, vol.2005
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
|