-
2
-
-
77950563250
-
-
The Economist, The Economist (US)
-
The Economist, "Cyberwarfare is becoming scarier," The Economist (US), 2007.
-
(2007)
Cyberwarfare Is Becoming Scarier
-
-
-
4
-
-
79952932317
-
Model-driven development for secure information systems
-
E. Fernandez-Medina, J. Juerjens, J. Trujillo, and S. Jajodia, "Model-driven development for secure information systems," Information and Software Technology, 2008.
-
(2008)
Information and Software Technology
-
-
Fernandez-Medina, E.1
Juerjens, J.2
Trujillo, J.3
Jajodia, S.4
-
5
-
-
33344465743
-
Model-driven engineering
-
D. C. Schmidt, "Model-driven engineering," IEEE Computer, vol. 39, no. 2, 2006.
-
(2006)
IEEE Computer
, vol.39
, Issue.2
-
-
Schmidt, D.C.1
-
6
-
-
35248828504
-
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin, "Aspect-oriented programming," pp. 220- 242, 1997.
-
(1997)
Aspect-oriented Programming
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
9
-
-
0242625201
-
Model driven security for process-oriented systems
-
ACM
-
D. Basin, J. Doser, and T. Lodderstedt, "Model driven security for process-oriented systems," in SACMAT '03: Proceedings of the eighth ACM Symposium on Access control models and technologies. ACM, 2003, pp. 100-109.
-
(2003)
SACMAT '03: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
10
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
L. Vigano, "Automated security protocol analysis with the AVISPA tool," Electronic Notes in Theoretical Computer Science, vol. 155, pp. 61-86, 2006.
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.155
, pp. 61-86
-
-
Vigano, L.1
-
13
-
-
84973703170
-
Assumptions underlying evaluation models
-
H. E. R., "Assumptions underlying evaluation models," Educational Researcher, 1978.
-
(1978)
Educational Researcher
-
-
R, H.E.1
-
16
-
-
30544446555
-
-
D. Coleman, G. Booch, D. Garlan, S. Iyengar, C. Kobryn, and V. Stavridou, "Is UML an architectural description language," 1999.
-
(1999)
Is UML An Architectural Description Language
-
-
Coleman, D.1
Booch, G.2
Garlan, D.3
Iyengar, S.4
Kobryn, C.5
Stavridou, V.6
-
20
-
-
27144493229
-
Secure software architectures design by aspect orientation
-
IEEE Computer Society
-
H. Yu, D. Liu, X. He, L. Yang, and S. Gao, "Secure software architectures design by aspect orientation," in ICECCS '05: Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems. IEEE Computer Society, 2005, pp. 47-55.
-
(2005)
ICECCS '05: Proceedings of the 10th IEEE International Conference on Engineering of Complex Computer Systems
, pp. 47-55
-
-
Yu, H.1
Liu, D.2
He, X.3
Yang, L.4
Gao, S.5
-
21
-
-
0023558367
-
Recognizing safety and liveness
-
B. Alpern, B. Alpera, F. B. Schneider, and F. B. Schneider, "Recognizing safety and liveness," Distributed Computing, vol. 2, pp. 117-126, 1987.
-
(1987)
Distributed Computing
, vol.2
, pp. 117-126
-
-
Alpern, B.1
Alpera, B.2
Schneider, F.B.3
Schneider, F.B.4
-
22
-
-
79952966332
-
A model-based aspect-oriented framework for building intrusion-aware software systems
-
Z. J. Zhu and M. Zulkernine, "A model-based aspect-oriented framework for building intrusion-aware software systems," Information and Software Technology, 2008.
-
(2008)
Information and Software Technology
-
-
Zhu, Z.J.1
Zulkernine, M.2
-
23
-
-
79952957370
-
-
WASC, Web Application Security Consortium, Tech. Rep., [Online]. Available
-
WASC, "Threat classification," Web Application Security Consortium, Tech. Rep., 2008. [Online]. Available: http://www.webappsec.org/ projects/threat
-
(2008)
Threat Classification
-
-
-
24
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. H. Drielsma, P. Heam, O. Kouchnarenko, J. Mantovani, S. Moedersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigano, and L. Vigneron, "The AVISPA tool for the automated validation of internet security protocols and applications," in Lecture Notes in Computer Science 3576, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3576
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.8
Kouchnarenko, O.9
Mantovani, J.10
Moedersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
26
-
-
0000974483
-
The state explosion problem
-
London, UK: Springer Verlag
-
A. Valmari, "The state explosion problem," in Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the volumes are based on the Advanced Course on Petri Nets. London, UK: Springer Verlag, 1998, pp. 429-528.
-
(1998)
Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the Volumes Are Based on the Advanced Course on Petri Nets
, pp. 429-528
-
-
Valmari, A.1
|