메뉴 건너뛰기




Volumn 6659 LNCS, Issue , 2011, Pages 504-526

Modelling secure systems evolution: Abstract and concrete change specifications

Author keywords

Security; Software Evolution; UMLsec; UMLseCh

Indexed keywords

SECURE SOFTWARE DEVELOPMENT; SECURE SYSTEM; SECURITY; SOFTWARE EVOLUTION; SYSTEM SPECIFICATION; TOOLS AND TECHNIQUES; UMLSEC; UMLSECH; SECURITY-CRITICAL;

EID: 79959225818     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21455-4_15     Document Type: Conference Paper
Times cited : (2)

References (31)
  • 2
    • 33750370954 scopus 로고    scopus 로고
    • Model transformations? Transformation models!
    • Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. Springer, Heidelberg
    • Bézivin, J., Büttner, F., Gogolla, M., Jouault, F., Kurtev, I., Lindow, A.: Model transformations? Transformation models! In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 440-453. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4199 , pp. 440-453
    • Bézivin, J.1    Büttner, F.2    Gogolla, M.3    Jouault, F.4    Kurtev, I.5    Lindow, A.6
  • 6
    • 18944394652 scopus 로고    scopus 로고
    • Modelling and verification of layered security protocols: A bank application
    • Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. Springer, Heidelberg
    • Grünbauer, J., Hollmann, H., Jürjens, J., Wimmel, G.: Modelling and verification of layered security protocols: A bank application. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 116-129. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2788 , pp. 116-129
    • Grünbauer, J.1    Hollmann, H.2    Jürjens, J.3    Wimmel, G.4
  • 7
    • 84957107637 scopus 로고    scopus 로고
    • Compositional verification of reactive systems specified by graph transformation
    • Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. Springer, Heidelberg
    • Heckel, R.: Compositional verification of reactive systems specified by graph transformation. In: Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. LNCS, vol. 1382, pp. 138-153. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1382 , pp. 138-153
    • Heckel, R.1
  • 11
    • 33750060125 scopus 로고    scopus 로고
    • Model-based security engineering with UML
    • Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. Springer, Heidelberg
    • Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42-77. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3655 , pp. 42-77
    • Jürjens, J.1
  • 12
    • 33846318194 scopus 로고    scopus 로고
    • Code security analysis of a biometric authentication system using automated theorem provers
    • IEEE Computer Society, Los Alamitos
    • Jürjens, J.: Code security analysis of a biometric authentication system using automated theorem provers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 138-149. IEEE Computer Society, Los Alamitos (2005)
    • (2005) Proceedings of the Annual Computer Security Applications Conference (ACSAC) , pp. 138-149
    • Jürjens, J.1
  • 14
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • Roman, G.-C., Griswold, W.G., Nuseibeh, B. (eds.) ACM Press, New York
    • Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Roman, G.-C., Griswold, W.G., Nuseibeh, B. (eds.) Proceedings of the International Conference on Software Engineering (ICSE), pp. 322-331. ACM Press, New York (2005)
    • (2005) Proceedings of the International Conference on Software Engineering (ICSE) , pp. 322-331
    • Jürjens, J.1
  • 15
    • 33745178885 scopus 로고    scopus 로고
    • Verification of low-level crypto-protocol implementations using automated theorem proving
    • IEEE, Los Alamitos
    • Jürjens, J.: Verification of low-level crypto-protocol implementations using automated theorem proving. In: MEMOCODE, pp. 89-98. IEEE, Los Alamitos (2005)
    • (2005) MEMOCODE , pp. 89-98
    • Jürjens, J.1
  • 18
    • 35348959376 scopus 로고    scopus 로고
    • Tools for secure systems development with UML. Intern
    • Invited submission to the special issue for FASE 2004/05
    • Jürjens, J., Shabalin, P.: Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 9(5-6), 527-544 (2007); Invited submission to the special issue for FASE 2004/05
    • (2007) Journal on Software Tools for Technology Transfer , vol.9 , Issue.5-6 , pp. 527-544
    • Jürjens, J.1    Shabalin, P.2
  • 20
    • 36048961543 scopus 로고    scopus 로고
    • Update transformations in the small with the epsilon wizard language
    • Kolovos, D.S., Paige, R.F., Polack, F., Rose, L.M.: Update transformations in the small with the epsilon wizard language. Journal of Object Technology 6(9), 53-69 (2007)
    • (2007) Journal of Object Technology , vol.6 , Issue.9 , pp. 53-69
    • Kolovos, D.S.1    Paige, R.F.2    Polack, F.3    Rose, L.M.4
  • 21
    • 0031648261 scopus 로고    scopus 로고
    • Software's future: Managing evolution
    • Lehman, M.: Software's future: Managing evolution. IEEE Software 15(1), 40-44 (1998)
    • (1998) IEEE Software , vol.15 , Issue.1 , pp. 40-44
    • Lehman, M.1
  • 22
    • 79959215532 scopus 로고    scopus 로고
    • Evolutionary systems design: Recognizing changes in security and survivability risks
    • Carnegie Mellon Software Engineering Institute September
    • Lipson, H.: Evolutionary systems design: Recognizing changes in security and survivability risks. Technical Report CMU/SEI-2006-TN-027, Carnegie Mellon Software Engineering Institute (September 2006)
    • (2006) Technical Report CMU/SEI-2006-TN-027
    • Lipson, H.1
  • 25
    • 35048897606 scopus 로고    scopus 로고
    • Model checking graph transformations: A comparison of two approaches
    • Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. Springer, Heidelberg
    • Rensink, A., Schmidt, Á., Varró, D.: Model checking graph transformations: A comparison of two approaches. In: Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. LNCS, vol. 3256, pp. 226-241. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3256 , pp. 226-241
    • Rensink, A.1    Schmidt, Á.2    Varró, D.3
  • 27
    • 79959259026 scopus 로고    scopus 로고
    • Secure Change Project
    • Secure Change Project. Deliverable 4.2., http://www-jj.cs.tu-dortmund.de/ jj/deliverable-4-2.pdf
    • Deliverable 4.2
  • 28
    • 0003624662 scopus 로고    scopus 로고
    • UML Revision Task Force. September
    • UML Revision Task Force. OMG Unified Modeling Language: Specification. Object Management Group (OMG) (September 2001), http://www.omg.org/spec/UML/1.4/ PDF/index.htm
    • (2001) OMG Unified Modeling Language: Specification
  • 29
    • 79959200417 scopus 로고    scopus 로고
    • UMLsec group. UMLsec Tool Suite (2001-2011), http://www.umlsec.de
    • (2001) UMLsec Tool Suite


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.