메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Model-driven development meets security: An evaluation of current approaches

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTION LEVEL; ECONOMIC CONSEQUENCES; MODEL DRIVEN DEVELOPMENT; POSITION SECURITY; PROTECTION MECHANISMS; RESEARCH CHALLENGES; SECURITY INCIDENT; SECURITY ISSUES; SOFTWARE SYSTEMS;

EID: 79952916356     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2011.310     Document Type: Conference Paper
Times cited : (11)

References (28)
  • 2
    • 77950563250 scopus 로고    scopus 로고
    • The Economist, The Economist (US)
    • The Economist, "Cyberwarfare is becoming scarier," The Economist (US), 2007.
    • (2007) Cyberwarfare Is Becoming Scarier
  • 5
    • 33344465743 scopus 로고    scopus 로고
    • Model-driven engineering
    • D. C. Schmidt, "Model-driven engineering," IEEE Computer, vol. 39, no. 2, 2006.
    • (2006) IEEE Computer , vol.39 , Issue.2
    • Schmidt, D.C.1
  • 10
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • L. Vigano, "Automated security protocol analysis with the AVISPA tool," Electronic Notes in Theoretical Computer Science, vol. 155, pp. 61-86, 2006.
    • (2006) Electronic Notes in Theoretical Computer Science , vol.155 , pp. 61-86
    • Vigano, L.1
  • 13
    • 84973703170 scopus 로고
    • Assumptions underlying evaluation models
    • H. E. R., "Assumptions underlying evaluation models," Educational Researcher, 1978.
    • (1978) Educational Researcher
    • R, H.E.1
  • 22
    • 79952966332 scopus 로고    scopus 로고
    • A model-based aspect-oriented framework for building intrusion-aware software systems
    • Z. J. Zhu and M. Zulkernine, "A model-based aspect-oriented framework for building intrusion-aware software systems," Information and Software Technology, 2008.
    • (2008) Information and Software Technology
    • Zhu, Z.J.1    Zulkernine, M.2
  • 23
    • 79952957370 scopus 로고    scopus 로고
    • WASC, Web Application Security Consortium, Tech. Rep., [Online]. Available
    • WASC, "Threat classification," Web Application Security Consortium, Tech. Rep., 2008. [Online]. Available: http://www.webappsec.org/ projects/threat
    • (2008) Threat Classification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.