-
2
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt. Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering Methodology, 15:39-91, 2006. (Pubitemid 43947939)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
7
-
-
77954942438
-
An architecture for enforcing end-to-end access control over web applications
-
B. Hicks, S. Rueda, D. King, T. Moyer, J. Schiffman, Y. Sreenivasan, P. McDaniel, and T. Jaeger. An architecture for enforcing end-to-end access control over web applications. In 15th ACM SACMAT, pages 163-172, 2010.
-
(2010)
15th ACM SACMAT
, pp. 163-172
-
-
Hicks, B.1
Rueda, S.2
King, D.3
Moyer, T.4
Schiffman, J.5
Sreenivasan, Y.6
McDaniel, P.7
Jaeger, T.8
-
9
-
-
57349145290
-
Context-aware role-based access control in pervasive computing systems
-
D. Kulkarni and A. Tripathi. Context-aware role-based access control in pervasive computing systems. In 13th ACM SACMAT, pages 113-122, 2008.
-
(2008)
13th ACM SACMAT
, pp. 113-122
-
-
Kulkarni, D.1
Tripathi, A.2
-
10
-
-
70450277229
-
Access control policy combining: Theory meets practice
-
N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin. Access control policy combining: theory meets practice. In 14th ACM SACMAT, pages 135-144, 2009.
-
(2009)
14th ACM SACMAT
, pp. 135-144
-
-
Li, N.1
Wang, Q.2
Qardaji, W.3
Bertino, E.4
Rao, P.5
Lobo, J.6
Lin, D.7
-
11
-
-
57349171335
-
Policy decomposition for collaborative access control
-
D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo. Policy decomposition for collaborative access control. In 13th ACM SACMAT, pages 103-112, 2008.
-
(2008)
13th ACM SACMAT
, pp. 103-112
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
12
-
-
38949106870
-
XACML policy integration algorithms
-
29, February
-
P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino. XACML Policy Integration Algorithms. ACM Transactions on Information System Security, 11:4:1-4:29, February 2008.
-
(2008)
ACM Transactions on Information System Security
, vol.11
, Issue.4
, pp. 1-4
-
-
Mazzoleni, P.1
Crispo, B.2
Sivasubramanian, S.3
Bertino, E.4
-
15
-
-
33745167684
-
When and how to develop domain-specific languages
-
M. Mernik, J. Heering, and A. Sloane. When and How to Develop Domain-Specific Languages. ACM Computing Surveys, 37(4):316-344, December 2005. (Pubitemid 43898543)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.4
, pp. 316-344
-
-
Mernik, M.1
Heering, J.2
Sloane, A.M.3
-
16
-
-
78549284586
-
New approach for the dynamic enforcement of Web services security
-
A. Mourad, S. Ayoubi, H. Yahyaoui, and H. Otrok. New approach for the dynamic enforcement of Web services security. In 8th Int. Conf. on Privacy Security and Trust, pages 189 -196, 2010.
-
(2010)
8th Int. Conf. on Privacy Security and Trust
, pp. 189-196
-
-
Mourad, A.1
Ayoubi, S.2
Yahyaoui, H.3
Otrok, H.4
-
17
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept.
-
B. Neuman and T. Ts'o. Kerberos: an authentication service for computer networks. Communications Magazine, IEEE, 32(9):33-38, Sept. 1994.
-
(1994)
Communications Magazine, IEEE
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
-
20
-
-
33646149431
-
-
March
-
OASIS. Security Assertion Markup Language. http://docs.oasis-open.org/ security/saml/v2.0/saml-core-2.0-os.pdf March 2005.
-
(2005)
Security Assertion Markup Language
-
-
-
23
-
-
55949114432
-
An access-control framework for WS-BPEL
-
F. Paci, E. Bertino, and J. Crampton. An Access-Control Framework for WS-BPEL. Int. J. f. Web Services Research, 5(3):20-43, 2008.
-
(2008)
Int. J. F. Web Services Research
, vol.5
, Issue.3
, pp. 20-43
-
-
Paci, F.1
Bertino, E.2
Crampton, J.3
-
24
-
-
36749060136
-
Service-oriented computing: State of the art and research challenges
-
M. P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service-Oriented Computing: State of the Art and Research Challenges. Computer, 40(11):38-45, 2007.
-
(2007)
Computer
, vol.40
, Issue.11
, pp. 38-45
-
-
Papazoglou, M.P.1
Traverso, P.2
Dustdar, S.3
Leymann, F.4
-
25
-
-
63449115454
-
A Taxonomy of Single Sign-On Systems
-
Information Security and Privacy
-
A. Pashalidis and C. J. Mitchell. A taxonomy of single sign-on systems. In 8th Australasian Conference on Information Security and Privacy, pages 249-264, 2003. (Pubitemid 36892639)
-
(2003)
Lecture Notes in Computer Science
, Issue.2727
, pp. 249-264
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
26
-
-
47049086486
-
Context-aware access control in pervasive healthcare
-
W. rong Jih, S. you Cheng, J. Y. jen Hsu, and T. ming Tsai. Context-aware access control in pervasive healthcare. In EEE Workshop: Mobility, Agents, and Mobile Services, 2005.
-
(2005)
EEE Workshop: Mobility, Agents, and Mobile Services
-
-
Jih, W.R.1
Cheng, S.Y.2
Hsu, J.Y.J.3
Tsai, T.M.4
-
27
-
-
0030086382
-
Rolebased access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Rolebased access control models. Computer, 29(2):38 -47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
28
-
-
33344465743
-
Model-driven engineering - guest editor's introduction
-
February
-
D. C. Schmidt. Model-Driven Engineering - Guest Editor's Introduction. Computer, 39(2), February 2006.
-
(2006)
Computer
, vol.39
, Issue.2
-
-
Schmidt, D.C.1
-
29
-
-
0141725660
-
The pragmatics of model-driven development
-
B. Selic. The Pragmatics of Model-Driven Development. IEEE Software, 20(5), 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.5
-
-
Selic, B.1
-
30
-
-
0141725642
-
Model transformation: The heart and soul of model-driven software development
-
S. Sendall and W. Kozaczynski. Model Transformation: The Heart and Soul of Model-Driven Software Development. IEEE Software, 20(5), 2003.
-
(2003)
IEEE Software
, vol.20
, Issue.5
-
-
Sendall, S.1
Kozaczynski, W.2
-
32
-
-
0346026383
-
Notable design patterns for domain-specific languages
-
PII S0164121200000893
-
D. Spinellis. Notable design patterns for domain-specific languages. J. of Systems and Software, 56(1):91-99, 2001. (Pubitemid 33649529)
-
(2001)
Journal of Systems and Software
, vol.56
, Issue.1
, pp. 91-99
-
-
Spinellis, D.1
-
35
-
-
77249095368
-
Scenario-driven role engineering
-
January/February
-
M. Strembeck. Scenario-driven Role Engineering. IEEE Security & Privacy, 8(1), January/February 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
-
-
Strembeck, M.1
-
36
-
-
79952439750
-
Modeling process-related RBAC models with extended UML activity models
-
May
-
M. Strembeck and J. Mendling. Modeling Process-related RBAC Models with Extended UML Activity Models. Information and Software Technology, 53(5), May 2011.
-
(2011)
Information and Software Technology
, vol.53
, Issue.5
-
-
Strembeck, M.1
Mendling, J.2
-
37
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
M. Strembeck and G. Neumann. An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM Trans. on Inf. and System Security, 7(3), 2004.
-
(2004)
ACM Trans. on Inf. and System Security
, vol.7
, Issue.3
-
-
Strembeck, M.1
Neumann, G.2
-
38
-
-
70349874815
-
An approach for the systematic development of domain-specific languages
-
October
-
M. Strembeck and U. Zdun. An Approach for the Systematic Development of Domain-Specific Languages. Software: Practice and Experience (SP&E), 39(15), October 2009.
-
(2009)
Software: Practice and Experience (SP&E)
, vol.39
, Issue.15
-
-
Strembeck, M.1
Zdun, U.2
-
39
-
-
63949084590
-
Model-driven business process security requirement specification
-
C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel. Model-driven business process security requirement specification. J. Syst. Archit., 55:211-223, 2009.
-
(2009)
J. Syst. Archit.
, vol.55
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
Miseldine, P.4
Meinel, C.5
-
41
-
-
84884127162
-
Modeling composition in dynamic programming environments with model transformations
-
U. Zdun and M. Strembeck. Modeling Composition in Dynamic Programming Environments with Model Transformations. In 5th Int. Sym. on Software Composition, 2006.
-
(2006)
5th Int. Sym. on Software Composition
-
-
Zdun, U.1
Strembeck, M.2
|