-
1
-
-
77951603984
-
Composing feature models
-
Denver, Colorado
-
M. Acher, P. Collet, P. Lahire, and R. France Composing feature models. Proceedings of the 2nd International Conference on Software Language Engineering (SLE'09) Denver, Colorado 2009 62 81
-
(2009)
Proceedings of the 2nd International Conference on Software Language Engineering (SLE'09)
, pp. 62-81
-
-
Acher, M.1
Collet, P.2
Lahire, P.3
France, R.4
-
2
-
-
34547403093
-
Refactoring product lines
-
DOI 10.1145/1173706.1173737, Proceedings of the 5th Int. Conf. on Generative Programming and Component Eng., GPCE'06. Co-located with the 21st Int. Conf. on Object-Oriented Programm., Syst., Languages, and Applic.OOPSLA 2006
-
V. Alves, R. Gheyi, T. Massoni, U. Kulesza, P. Borba, and C. Lucena Refactoring product lines. Proceedings of the 5th international conference on Generative Programming and Component Engineering 2006 201 210 (Pubitemid 47168639)
-
(2006)
Proceedings of the 5th International Conference on Generative Programming and Component Engineering, GPCE'06
, pp. 201-210
-
-
Alves, V.1
Gheyi, R.2
Massoni, T.3
Kulesza, U.4
Borba, P.5
Lucena, C.6
-
4
-
-
70349524148
-
Type-safe Feature-oriented Product Lines
-
University of Passau
-
Apel, S.; Grös̈linger, A.; Kästner, C.; Lengauer, C.; 2009. Type-safe Feature-oriented Product Lines. Technical Report MIP-0909, Department of Informatics and Mathematics, University of Passau.
-
(2009)
Technical Report MIP-0909, Department of Informatics and Mathematics
-
-
Apel, S.1
Grös̈linger, A.2
Kästner, C.3
Lengauer, C.4
-
8
-
-
0003400255
-
Integrity Considerations for Secure Computer Systems
-
Bedford, MA. Air Force Electronic Systems Division
-
Biba, K.J.; 1977. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, Bedford, MA. Air Force Electronic Systems Division.
-
(1977)
Technical Report ESD-TR-76-372
-
-
Biba, K.J.1
-
15
-
-
80053570407
-
RBAC/MAC security for UML
-
Catalonia, Spain
-
T. Doan, S. Demurjian, T. Ting, and C. Phillips RBAC/MAC security For UML. Proceedings of IFIP TC11/WG 11.3 Annual Conference on Data and Applications Security Catalonia, Spain 2004 189 202
-
(2004)
Proceedings of IFIP TC11/WG 11.3 Annual Conference on Data and Applications Security
, pp. 189-202
-
-
Doan, T.1
Demurjian, S.2
Ting, T.3
Phillips, C.4
-
18
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli Proposed NIST standard for role-based access control ACM Transactions on Information and Systems Security 4 3 2001 224 274
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
22
-
-
30144433198
-
Privacy Enforcement with an Extended Role-Based Access Control Model
-
North Carolina State University, Raleigh, NC
-
He, Q.; 2003. Privacy Enforcement with an Extended Role-Based Access Control Model. Technical Report TR-2003-09, Computer Science Department, North Carolina State University, Raleigh, NC.
-
(2003)
Technical Report TR-2003-09, Computer Science Department
-
-
He, Q.1
-
24
-
-
0003512056
-
Feature-Oriented Domain Analysis (FODA) Feasibility Study
-
Carnegie Mellon University, Pittsburgh, Pennsylvania
-
Kang, K.; Cohen, S.; Hess, J.; Nowak, W.; Peterson, S.; 1990. Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical Report CMU/SEI-90TR-21, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania.
-
(1990)
Technical Report CMU/SEI-90TR-21, Software Engineering Institute
-
-
Kang, K.1
Cohen, S.2
Hess, J.3
Nowak, W.4
Peterson, S.5
-
25
-
-
80053574665
-
A Modeling Approach to Configurable Role-Based Access Control
-
June Oakland University, Rochester, MI
-
Kim, D.; Lu, L.; Kim, S.; June 2009. A Modeling Approach to Configurable Role-Based Access Control. Technical Report CSE-09-TR-0601, CSE Department, Oakland University, Rochester, MI.
-
(2009)
Technical Report CSE-09-TR-0601, CSE Department
-
-
Kim, D.1
Lu, L.2
Kim, S.3
-
27
-
-
33144472884
-
Modeling role-based access control using parameterized UML models
-
Barcelona, Spain
-
D. Kim, I. Ray, R. France, and N. Li Modeling role-based access control using parameterized UML models. Proceedings of the 7th Fundamental Approaches to Software Engineering (FASE/ETAPS) Barcelona, Spain 2004 180 193
-
(2004)
Proceedings of the 7th Fundamental Approaches to Software Engineering (FASE/ETAPS)
, pp. 180-193
-
-
Kim, D.1
Ray, I.2
France, R.3
Li, N.4
-
28
-
-
67949108025
-
Quality-driven architecture development using architectural tactics
-
S. Kim, D. Kim, L. Lu, and S. Park Quality-driven architecture development using architectural tactics Journal of Systems and Software 82 8 2009 1211 1231
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.8
, pp. 1211-1231
-
-
Kim, S.1
Kim, D.2
Lu, L.3
Park, S.4
-
31
-
-
15944413918
-
Context sensitivity in role-based access control
-
DOI 10.1145/567331.567336
-
A. Kumar, N.M. Karnik, and G. Chafle Context sensitivity in role-based access control ACM SIGPOS Operating Systems Review 36 3 2002 53 66 (Pubitemid 41107669)
-
(2002)
Operating Systems Review (ACM)
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
33
-
-
47949083738
-
Disambiguating the documentation of variability in software product lines: A separation of concerns, formalization and automated analysis
-
A. Metzger, P. Heymans, K. Pohl, P.-Y. Schobbens, and G. Saval Disambiguating the documentation of variability in software product lines: a separation of concerns, formalization and automated analysis Proceedings of the International Conference on Requirements Engineering 2007 243 253
-
(2007)
Proceedings of the International Conference on Requirements Engineering
, pp. 243-253
-
-
Metzger, A.1
Heymans, P.2
Pohl, K.3
Schobbens, P.-Y.4
Saval, G.5
-
35
-
-
33746680163
-
A pattern system for access control
-
Sitges, Spain
-
T. Priebe, E.B. Fernandez, J.I. Mehlau, and G. Pernul A pattern system for access control. Proceedings of 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security Sitges, Spain 2004 25 28
-
(2004)
Proceedings of 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security
, pp. 25-28
-
-
Priebe, T.1
Fernandez, E.B.2
Mehlau, J.I.3
Pernul, G.4
-
41
-
-
57049103989
-
Automated merging of feature models using graph transformations
-
R. Lammel, J. Visser, J. Saraiva, Springer Heidelberg
-
S. Segura, D. Benavides, A. Ruiz-Cortes, and P. Trinidad Automated merging of feature models using graph transformations R. Lammel, J. Visser, J. Saraiva, Generative and Transformational Techniques in Software Engineering II, LNCS, vol. 5235 2008 Springer Heidelberg 489 505
-
(2008)
Generative and Transformational Techniques in Software Engineering II, LNCS, Vol. 5235
, pp. 489-505
-
-
Segura, S.1
Benavides, D.2
Ruiz-Cortes, A.3
Trinidad, P.4
-
43
-
-
30644467106
-
Verifiable composition of access control and application features
-
DOI 10.1145/1063979.1064001, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
E. Song, R. Reddy, R. France, I. Ray, G. Georg, and R. Alexander Verifiable composition of access control and application features. Proceedings of the 10th ACM Symposium on Access Control Models and Technologies Stockholm, Sweden 2005 120 129 (Pubitemid 43087468)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 120-129
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
-
45
-
-
33646150573
-
Model composition directives
-
G. Straw, G. Georg, E. Song, S. Ghosh, R. France, and J. Bieman Model composition directives. Proceedings of the 7th International Conference on the UML Lisbon, Portugal 2004 84 97 (Pubitemid 39737629)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3273
, pp. 84-97
-
-
Straw, G.1
Georg, G.2
Song, E.3
Ghosh, S.4
France, R.5
Bieman, J.M.6
|