메뉴 건너뛰기




Volumn 6698 LNCS, Issue , 2011, Pages 52-68

Incremental security verification for evolving UMLsec models

Author keywords

[No Author keywords available]

Indexed keywords

INCREMENTAL VERIFICATION; SECURE SOFTWARE DEVELOPMENT; SECURITY ANALYSIS; SECURITY PROPERTIES; SECURITY VERIFICATION; SYSTEM DEVELOPMENT; TOOL SUPPORT; VERIFICATION TECHNIQUES; SECURITY-CRITICAL; TECHNIQUES AND TOOLS;

EID: 79959249133     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21470-7_5     Document Type: Conference Paper
Times cited : (8)

References (17)
  • 2
    • 33750370954 scopus 로고    scopus 로고
    • Model transformations? Transformation models!
    • Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. Springer, Heidelberg
    • Bézivin, J., Büttner, F., Gogolla, M., Jouault, F., Kurtev, I., Lindow, A.: Model transformations? Transformation models! In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 440-453. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4199 , pp. 440-453
    • Bézivin, J.1    Büttner, F.2    Gogolla, M.3    Jouault, F.4    Kurtev, I.5    Lindow, A.6
  • 3
    • 74349120926 scopus 로고    scopus 로고
    • Evolution styles: Foundations and tool support for software architecture evolution
    • September
    • Garlan, D., Barnes, J., Schmerl, B., Celiku, O.: Evolution styles: Foundations and tool support for software architecture evolution. In: WICSA/ECSA 2009, pp. 131-140 (September 2009)
    • (2009) WICSA/ECSA 2009 , pp. 131-140
    • Garlan, D.1    Barnes, J.2    Schmerl, B.3    Celiku, O.4
  • 4
    • 84957107637 scopus 로고    scopus 로고
    • Compositional verification of reactive systems specified by graph transformation
    • Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. Springer, Heidelberg
    • Heckel, R.: Compositional verification of reactive systems specified by graph transformation. In: Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. LNCS, vol. 1382, pp. 138-153. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1382 , pp. 138-153
    • Heckel, R.1
  • 7
    • 79959225818 scopus 로고    scopus 로고
    • Modelling secure systems evolution: Abstract and concrete change specifications (invited lecture)
    • Bernardo, I. (ed.) 11th School on Formal Methods (SFM 2011), Bertinoro, Italy, June 13-18. Springer, Heidelberg
    • Jürjens, J., Ochoa, M., Schmidt, H., Marchal, L., Houmb, S., Islam, S.: Modelling secure systems evolution: Abstract and concrete change specifications (invited lecture). In: Bernardo, I. (ed.) 11th School on Formal Methods (SFM 2011), Bertinoro, Italy, June 13-18. LNCS. Springer, Heidelberg (2011)
    • (2011) LNCS
    • Jürjens, J.1    Ochoa, M.2    Schmidt, H.3    Marchal, L.4    Houmb, S.5    Islam, S.6
  • 8
    • 35348959376 scopus 로고    scopus 로고
    • Tools for secure systems development with UML. Intern
    • Invited submission to the special issue for FASE 2004/05
    • Jürjens, J., Shabalin, P.: Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 9(5-6), 527-544 (2007); Invited submission to the special issue for FASE 2004/05
    • (2007) Journal on Software Tools for Technology Transfer , vol.9 , Issue.5-6 , pp. 527-544
    • Jürjens, J.1    Shabalin, P.2
  • 9
    • 36048961543 scopus 로고    scopus 로고
    • Update transformations in the small with the epsilon wizard language
    • Kolovos, D.S., Paige, R.F., Polack, F., Rose, L.M.: Update transformations in the small with the epsilon wizard language. Journal of Object Technology 6(9), 53-69 (2007)
    • (2007) Journal of Object Technology , vol.6 , Issue.9 , pp. 53-69
    • Kolovos, D.S.1    Paige, R.F.2    Polack, F.3    Rose, L.M.4
  • 10
    • 0031335655 scopus 로고    scopus 로고
    • Metrics and Laws of Software Evolution - The Nineties View
    • IEEE Computer Society, Washington, DC, USA
    • Lehman, M.M., Ramil, J.F., Wernick, P.D., Perry, D.E., Turski, W.M.: Metrics and Laws of Software Evolution - The Nineties View. In: METRICS 1997, pp. 20-32. IEEE Computer Society, Washington, DC, USA (1997)
    • (1997) METRICS 1997 , pp. 20-32
    • Lehman, M.M.1    Ramil, J.F.2    Wernick, P.D.3    Perry, D.E.4    Turski, W.M.5
  • 11
    • 70349662487 scopus 로고    scopus 로고
    • Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
    • IEEE Computer Society, Los Alamitos, CA, USA
    • Mellado, D., Rodriguez, J., Fernandez-Medina, E., Piattini, M.: Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. In: AReS 2009, pp. 224-231. IEEE Computer Society, Los Alamitos, CA, USA (2009)
    • (2009) AReS 2009 , pp. 224-231
    • Mellado, D.1    Rodriguez, J.2    Fernandez-Medina, E.3    Piattini, M.4
  • 12
  • 13
    • 77953088569 scopus 로고    scopus 로고
    • Evolving Software Architecture Descriptions of Critical Systems
    • Mens, T., Magee, J., Rumpe, B.: Evolving Software Architecture Descriptions of Critical Systems. Computer 43(5), 42-48 (2010)
    • (2010) Computer , vol.43 , Issue.5 , pp. 42-48
    • Mens, T.1    Magee, J.2    Rumpe, B.3
  • 14
    • 35048897606 scopus 로고    scopus 로고
    • Model checking graph transformations: A comparison of two approaches
    • Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. Springer, Heidelberg
    • Rensink, A., Schmidt, Á., Varró, D.: Model checking graph transformations: A comparison of two approaches. In: Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. LNCS, vol. 3256, pp. 226-241. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3256 , pp. 226-241
    • Rensink, A.1    Schmidt, Á.2    Varró, D.3
  • 15
    • 84911359649 scopus 로고    scopus 로고
    • Deliverable 4.2
    • Secure Change Project. Deliverable 4.2, http://www-jj.cs.tu-dortmund.de/ jj/deliverable-4-2.pdf
    • Secure Change Project
  • 16
    • 33947608669 scopus 로고    scopus 로고
    • Software requirements and architecture modeling for evolving non-secure applications into secure applications
    • Shin, M.E., Gomaa, H.: Software requirements and architecture modeling for evolving non-secure applications into secure applications. Science of Computer Programming 66(1), 60-70 (2007)
    • (2007) Science of Computer Programming , vol.66 , Issue.1 , pp. 60-70
    • Shin, M.E.1    Gomaa, H.2
  • 17
    • 77954833400 scopus 로고    scopus 로고
    • Model-based argument analysis for evolving security requirements
    • IEEE Computer Society, Los Alamitos
    • Tun, T.T., Yu, Y., Haley, C.B., Nuseibeh, B.: Model-based argument analysis for evolving security requirements. In: SSIRI 2010, pp. 88-97. IEEE Computer Society, Los Alamitos (2010)
    • (2010) SSIRI 2010 , pp. 88-97
    • Tun, T.T.1    Yu, Y.2    Haley, C.B.3    Nuseibeh, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.