-
1
-
-
55049109759
-
Model-driven security engineering for trust management in SECTET
-
M. Alam, R. Breu, and M. Hafner Model-driven security engineering for trust management in SECTET Journal of Software 2 1 2007 47 60
-
(2007)
Journal of Software
, vol.2
, Issue.1
, pp. 47-60
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
3
-
-
33750059814
-
Towards a security engineering process
-
Orlando, Florida, USA
-
Artelsmair C, Wagner R. Towards a security engineering process. In: Proceedings of the the seventh world multiconference on systemics, cybernetics and informatics, Orlando, Florida, USA; 2003.
-
(2003)
Proceedings of the the Seventh World Multiconference on Systemics, Cybernetics and Informatics
-
-
Artelsmair, C.1
Wagner, R.2
-
6
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville Information systems security design methods: implications for information systems development ACM Computing Surveys 25 4 1993 375 414
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
10
-
-
85056980116
-
Cap. 4. Pragmatic security for constrained wireless networks
-
Tuscaloosa, USA: A. Publications. The University of Alabama;
-
Bradford PG, Grizzell BM, Jay GT, Jenkins JT. Cap. 4. Pragmatic security for constrained wireless networks. In: Security in distributed, grid, mobile, and pervasive computing, Tuscaloosa, USA: A. Publications. The University of Alabama; 2007. 440 p.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
-
-
Bradford, P.G.1
Grizzell, B.M.2
Jay, G.T.3
Jenkins, J.T.4
-
11
-
-
0032592471
-
A new model of security for metasystems
-
S. Chapin, C. Wang, W. Wulf, F. Knabe, and A. Grimshaw A new model of security for metasystems Future Generation Computer Systems 15 56 1999 713 722
-
(1999)
Future Generation Computer Systems
, vol.15
, Issue.56
, pp. 713-722
-
-
Chapin, S.1
Wang, C.2
Wulf, W.3
Knabe, F.4
Grimshaw, A.5
-
12
-
-
60849106337
-
Special issue: Model-driven development for secure information systems
-
E. Fernández-Medina, J. Jurjens, J. Trujillo, and S. Jajodia Special issue: model-driven development for secure information systems Information and Software Technology 51 5 2009 809 814
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 809-814
-
-
Fernández-Medina, E.1
Jurjens, J.2
Trujillo, J.3
Jajodia, S.4
-
13
-
-
38149119052
-
Security patterns and secure systems design
-
E. Fernandez Security patterns and secure systems design Dependable Computing 2007 233 234
-
(2007)
Dependable Computing
, pp. 233-234
-
-
Fernandez, E.1
-
14
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
Chapter V
-
E.B. Fernández, M.M. Larrondo-Petrie, T. Sorgente, and M. Vanhilst Chapter V. A methodology to develop secure systems using patterns H. Mouratidis, P. Giorgini, Integrating security and software engineering. Advances and future vision 2007 Idea Group Publishing 107 126
-
(2007)
Integrating Security and Software Engineering. Advances and Future Vision
, pp. 107-126
-
-
Fernández, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Vanhilst, M.4
-
20
-
-
42749098120
-
A grid service infrastructure for mobile devices
-
Beijing, China;
-
Guan T, Zaluska E, Roure DD. A grid service infrastructure for mobile devices. In: Proceedings of the first international conference on semantics, knowledge, an grid (SKG 2005), Beijing, China; 2005.
-
(2005)
Proceedings of the First International Conference on Semantics, Knowledge, An Grid (SKG 2005)
-
-
Guan, T.1
Zaluska, E.2
Roure, D.D.3
-
21
-
-
38949162568
-
PWSSec: Process for web services security
-
Orlando, Florida, USA.
-
Gutiérrez C, Fernández-Medina E, Piatini M. PWSSec: process for web services security. In: Proceedings of the IEEE international conference on web services, Orlando, Florida, USA; 2005.
-
(2005)
Proceedings of the IEEE International Conference on Web Services
-
-
Gutiérrez, C.1
Fernández-Medina, E.2
Piatini, M.3
-
28
-
-
35048842754
-
Enhancing grid security infrastructure to support mobile computing nodes
-
L. Kwok-Yan, Z. Xi-Bin, C. Siu-Leung, M. Gu, and S. Jia-Guang Enhancing Grid Security Infrastructure to Support mobile computing nodes Lecture Notes in Computer Science 2908/2003 2004 42 54 (Pubitemid 39743402)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2908
, pp. 42-54
-
-
Lam, K.-Y.1
Zhao, X.-B.2
Chung, S.-L.3
Gu, M.4
Sun, J.-G.5
-
33
-
-
17144369692
-
-
Nagaratnam N, Janson P, Dayka J, Nadalin A, Siebenlist F, Welch V., et al. The Security Architecture for Open Grid Services; 2003.
-
(2003)
The Security Architecture for Open Grid Services
-
-
Nagaratnam, N.1
Janson, P.2
Dayka, J.3
Nadalin, A.4
Siebenlist, F.5
Welch, V.6
-
34
-
-
78751489956
-
Chapter 5: Integrating mobile wireless devices into the computational grid
-
T. Phan, L. Huang, N. Ruiz, and R. Bagrodia Chapter 5: integrating mobile wireless devices into the computational grid M. Ilyas, I. Mahgoub, Mobile computing handbook 2005 Auerbach Publications
-
(2005)
Mobile Computing Handbook
-
-
Phan, T.1
Huang, L.2
Ruiz, N.3
Bagrodia, R.4
-
35
-
-
2142660748
-
Securing next generation grids
-
L. Ramakrishnan Securing next generation grids IT Professional 6 2004 34 39 IEEE Computer Society
-
(2004)
IT Professional
, vol.6
, pp. 34-39
-
-
Ramakrishnan, L.1
-
38
-
-
78650294009
-
Developing a secure mobile Grid system through a UML extension
-
D.G. Rosado, E. Fernández-Medina, J. López, and M. Piattini Developing a secure mobile Grid system through a UML extension Journal of Universal Computer Science 16 17 2010 2333 2352
-
(2010)
Journal of Universal Computer Science
, vol.16
, Issue.17
, pp. 2333-2352
-
-
Rosado, D.G.1
Fernández-Medina, E.2
López, J.3
Piattini, M.4
-
40
-
-
33750490069
-
-
Chapter 8, Prentice Hall
-
C. Steel, R. Nagappan, and R. Lai Chapter 8. The alchemy of security design methodology, patterns, and reality checks. core security patterns: best practices and strategies for J2EE, web services, and identity management 2005 Prentice Hall 1088 p
-
(2005)
The Alchemy of Security Design Methodology, Patterns, and Reality Checks. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
-
43
-
-
79956133386
-
-
A. Publications Tuscaloosa, USA
-
J.L. Vivas, J. López, and J.A. Montenegro Chapter 12. Grid security architecture: requirements, fundamentals, standards, and models. Security in distributed, grid, mobile, and pervasive computing 2007 A. Publications Tuscaloosa, USA 440 p
-
(2007)
Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards, and Models. Security in Distributed, Grid, Mobile, and Pervasive Computing
-
-
Vivas, J.L.1
López, J.2
Montenegro, J.A.3
|