-
1
-
-
0003880013
-
-
Addison-Wesley Longman Publishing Co., Inc.
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc., 1995.
-
(1995)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
4
-
-
2942742710
-
-
Object Management Group, Specification Version 2 [Online]
-
OMG, "The UML 2.0 Superstructure Specification," Object Management Group, Specification Version 2, 2004. [Online]. Available: http://www.omg.org/docs/formal/07-11-04.pdf
-
(2004)
The UML 2.0 Superstructure Specification
-
-
-
5
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security: from UML Models to Access Control Infrastructures," ACM Transactions on Software Engineering and Methodology, vol. 15, no. 1, pp. 39-91, January 2006. (Pubitemid 43947939)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
7
-
-
54849408511
-
Trust requirements in identity management
-
Australian Computer Society, Inc.
-
A. Jøsang, J. Fabre, B. Hay, J. Dalziel, and S. Pope, "Trust Requirements in Identity Management," in ACSW Frontiers 05: Proceedings of the 2005 Australasian workshop on Grid computing and e-research. Australian Computer Society, Inc., 2005, pp. 99-108.
-
(2005)
ACSW Frontiers 05: Proceedings of the 2005 Australasian Workshop on Grid Computing and E-research
, pp. 99-108
-
-
Jøsang, A.1
Fabre, J.2
Hay, B.3
Dalziel, J.4
Pope, S.5
-
8
-
-
77957265737
-
A pattern-driven generation of security policies for service-oriented architectures
-
IEEE Computer Society, Jul
-
M. Menzel, R. Warschofsky, and C. Meinel, "A Pattern-driven Generation of Security Policies for Service-oriented Architectures," in ICWS '10: IEEE International Conference on Web Services. IEEE Computer Society, Jul. 2010, pp. 243-250.
-
(2010)
ICWS '10: Ieee International Conference on Web Services
, pp. 243-250
-
-
Menzel, M.1
Warschofsky, R.2
Meinel, C.3
-
9
-
-
27744456629
-
-
Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc.
-
G. Meszaros and J. Doble, A pattern language for pattern writing. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 1997, pp. 529-574.
-
(1997)
A Pattern Language for Pattern Writing
, pp. 529-574
-
-
Meszaros, G.1
Doble, J.2
-
10
-
-
49049109969
-
A pattern language for identity management
-
Washington, DC, USA: IEEE Computer Society
-
N. A. Delessy, E. B. Fernandez, and M. M. Larrondo-Petrie, "A Pattern Language for Identity Management," in ICCGI '07: Proceedings of the International Multi-Conference on Computing in the Global Information Technology. Washington, DC, USA: IEEE Computer Society, 2007, p. 31.
-
(2007)
ICCGI '07: Proceedings of the International Multi-conference on Computing in the Global Information Technology
, pp. 31
-
-
Delessy, N.A.1
Fernandez, E.B.2
Larrondo-Petrie, M.M.3
-
11
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, pp. 993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
|