-
1
-
-
60849104397
-
Automated Analysis of Security-Design Models
-
Basin, D., Clavel, M., Doser, J., Egea, M.: Automated Analysis of Security-Design Models. Information and Software Technology 51(5), 815-831 (2009)
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
2
-
-
33745471209
-
Model Driven Security: From UML Models to Access Control Infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
0028428376
-
Converting OO Models into RDBMS Schema
-
Blaha, M., Premerlani, W., Shen, H.: Converting OO Models into RDBMS Schema. IEEE Software 11, 28-39 (1994)
-
(1994)
IEEE Software
, vol.11
, pp. 28-39
-
-
Blaha, M.1
Premerlani, W.2
Shen, H.3
-
4
-
-
79960309609
-
Oracle Label Security
-
Czuprynski, J.: Oracle Label Security. The Database Journal (2003), http://www.databasejournal.com
-
(2003)
The Database Journal
-
-
Czuprynski, J.1
-
6
-
-
84899175349
-
A Methodology to Develop Secure Systems Using Patterns
-
ch. 5, IDEA Press
-
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: A Methodology to Develop Secure Systems Using Patterns. In: Integrating Security and Software Engineering: Advances and Future Vision, ch. 5, pp. 107-126. IDEA Press (2006)
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
8
-
-
0003880013
-
-
Addison-Wesley, Boston
-
Gamma, E., Helm, R., Johnson, R., Vlissides, J.M.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston (1994)
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.M.4
-
9
-
-
85015557893
-
A Framework for Generating Query Language Code from OCL Invariants
-
Akehurst, D.H., Gogolla, M., Zschaler, S. (eds.)
-
Heidenreich, F., Wende, C., Demuth, B.: A Framework for Generating Query Language Code from OCL Invariants. In: Akehurst, D.H., Gogolla, M., Zschaler, S. (eds.) Proceedings of the 7th OCL Workshop at the UML/MoDELS Conference, Ocl4All - Modelling Systems with OCL. ECEASST, vol. 9 (2008)
-
(2008)
Proceedings of the 7th OCL Workshop at the UML/MoDELS Conference, Ocl4All - Modelling Systems with OCL. ECEASST
, vol.9
-
-
Heidenreich, F.1
Wende, C.2
Demuth, B.3
-
10
-
-
45849085734
-
ATL: A Model Transformation Tool
-
Jouault, F., Allilaire, F., Bézivin, J., Kurtev, I.: ATL: A Model Transformation Tool. Science of Computer Programming 72(1-2), 31-39 (2008)
-
(2008)
Science of Computer Programming
, vol.72
, Issue.1-2
, pp. 31-39
-
-
Jouault, F.1
Allilaire, F.2
Bézivin, J.3
Kurtev, I.4
-
12
-
-
37849187634
-
UML Specification of Access Control Policies and their Formal Verification
-
Koch, M., Parisi-Presicce, F.: UML Specification of Access Control Policies and their Formal Verification. Software and System Modeling 5(4), 429-447 (2006)
-
(2006)
Software and System Modeling
, vol.5
, Issue.4
, pp. 429-447
-
-
Koch, M.1
Parisi-Presicce, F.2
-
13
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
-
Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
15
-
-
77954504239
-
From Goal Driven Security Requirements Engineering to Secure Design
-
Mouratidis, H., Jurjens, J.: From Goal Driven Security Requirements Engineering to Secure Design. International Journal of Intelligent Systems 25(8), 813-840 (2010)
-
(2010)
International Journal of Intelligent Systems
, vol.25
, Issue.8
, pp. 813-840
-
-
Mouratidis, H.1
Jurjens, J.2
-
16
-
-
0013137299
-
-
Version 2.2
-
Object Constraint Language. OMG Specification, Version 2.2, http://www.omg.org/spec/OCL/2.2/
-
Object Constraint Language
-
-
-
17
-
-
77949562741
-
A Framework of Composable Access Control Features: Preserving Separation of Access Control Concerns from Models to Code
-
Pavlich-Mariscal, J.A., Demurjian, S.A., Michel, L.D.: A Framework of Composable Access Control Features: Preserving Separation of Access Control Concerns from Models to Code. Computers & Security 29(3), 350-379 (2010)
-
(2010)
Computers & Security
, vol.29
, Issue.3
, pp. 350-379
-
-
Pavlich-Mariscal, J.A.1
Demurjian, S.A.2
Michel, L.D.3
-
18
-
-
1942536622
-
An Aspect-Based Approach to Modeling Access Control Concerns
-
Ray, I., France, R.B., Li, N., Georg, G.: An Aspect-Based Approach to Modeling Access Control Concerns. Information and Software Technology 46(9), 575-587 (2004)
-
(2004)
Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
19
-
-
67349109419
-
Utilizing Domain Models for Application Design and Validation
-
Reinhartz-Berger, I., Sturm, A.: Utilizing Domain Models for Application Design and Validation. Information & Software Technology 51(8), 1275-1289 (2009)
-
(2009)
Information & Software Technology
, vol.51
, Issue.8
, pp. 1275-1289
-
-
Reinhartz-Berger, I.1
Sturm, A.2
-
20
-
-
33646188481
-
-
Springer-Verlag New York, Inc., Secaucus
-
Schumacher, M.: Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag New York, Inc., Secaucus (2003)
-
(2003)
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
-
-
Schumacher, M.1
-
21
-
-
33750050331
-
-
John Wiley & Sons, Chichester
-
Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Chichester (2006)
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
22
-
-
0141725660
-
The Pragmatics of Model-Driven Development
-
Selic, B.: The Pragmatics of Model-Driven Development. IEEE Software 20(5), 19-25 (2003)
-
(2003)
IEEE Software
, vol.20
, Issue.5
, pp. 19-25
-
-
Selic, B.1
-
24
-
-
84911352016
-
-
String Template (2010), http://www.stringtemplate.org
-
(2010)
-
-
|