메뉴 건너뛰기




Volumn 83 LNBIP, Issue , 2011, Pages 637-651

A pattern based approach for secure database design

Author keywords

authorization; database design; Secure software engineering

Indexed keywords

DATABASE SYSTEMS; INFORMATION SYSTEMS; SECURITY SYSTEMS; SOFTWARE ENGINEERING; SYSTEMS ANALYSIS; SYSTEMS ENGINEERING; TECHNICAL PRESENTATIONS;

EID: 79960333132     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-22056-2_65     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 3
    • 0028428376 scopus 로고
    • Converting OO Models into RDBMS Schema
    • Blaha, M., Premerlani, W., Shen, H.: Converting OO Models into RDBMS Schema. IEEE Software 11, 28-39 (1994)
    • (1994) IEEE Software , vol.11 , pp. 28-39
    • Blaha, M.1    Premerlani, W.2    Shen, H.3
  • 4
  • 12
    • 37849187634 scopus 로고    scopus 로고
    • UML Specification of Access Control Policies and their Formal Verification
    • Koch, M., Parisi-Presicce, F.: UML Specification of Access Control Policies and their Formal Verification. Software and System Modeling 5(4), 429-447 (2006)
    • (2006) Software and System Modeling , vol.5 , Issue.4 , pp. 429-447
    • Koch, M.1    Parisi-Presicce, F.2
  • 13
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-Based Modeling Language for Model-Driven Security
    • Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
    • Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.A.2    Doser, J.3
  • 15
    • 77954504239 scopus 로고    scopus 로고
    • From Goal Driven Security Requirements Engineering to Secure Design
    • Mouratidis, H., Jurjens, J.: From Goal Driven Security Requirements Engineering to Secure Design. International Journal of Intelligent Systems 25(8), 813-840 (2010)
    • (2010) International Journal of Intelligent Systems , vol.25 , Issue.8 , pp. 813-840
    • Mouratidis, H.1    Jurjens, J.2
  • 16
    • 0013137299 scopus 로고    scopus 로고
    • Version 2.2
    • Object Constraint Language. OMG Specification, Version 2.2, http://www.omg.org/spec/OCL/2.2/
    • Object Constraint Language
  • 17
    • 77949562741 scopus 로고    scopus 로고
    • A Framework of Composable Access Control Features: Preserving Separation of Access Control Concerns from Models to Code
    • Pavlich-Mariscal, J.A., Demurjian, S.A., Michel, L.D.: A Framework of Composable Access Control Features: Preserving Separation of Access Control Concerns from Models to Code. Computers & Security 29(3), 350-379 (2010)
    • (2010) Computers & Security , vol.29 , Issue.3 , pp. 350-379
    • Pavlich-Mariscal, J.A.1    Demurjian, S.A.2    Michel, L.D.3
  • 18
  • 19
    • 67349109419 scopus 로고    scopus 로고
    • Utilizing Domain Models for Application Design and Validation
    • Reinhartz-Berger, I., Sturm, A.: Utilizing Domain Models for Application Design and Validation. Information & Software Technology 51(8), 1275-1289 (2009)
    • (2009) Information & Software Technology , vol.51 , Issue.8 , pp. 1275-1289
    • Reinhartz-Berger, I.1    Sturm, A.2
  • 22
    • 0141725660 scopus 로고    scopus 로고
    • The Pragmatics of Model-Driven Development
    • Selic, B.: The Pragmatics of Model-Driven Development. IEEE Software 20(5), 19-25 (2003)
    • (2003) IEEE Software , vol.20 , Issue.5 , pp. 19-25
    • Selic, B.1
  • 24
    • 84911352016 scopus 로고    scopus 로고
    • String Template (2010), http://www.stringtemplate.org
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.