-
1
-
-
0042266220
-
The best of both worlds integrating UML with z for software specifications
-
S. Martin, "The Best of Both Worlds Integrating UML with Z for Software Specifications," Journal of Computing and Control Engineering, vol. 14, pp. 8-11, (2003).
-
(2003)
Journal of Computing and Control Engineering
, vol.14
, pp. 8-11
-
-
Martin, S.1
-
3
-
-
60849104397
-
Automated analysis of security design models
-
D. A. Basin, M. Clavel, J. Doser, and M. Egea, "Automated Analysis of Security Design Models," Information and Software Technology, Special issue on Model Based Development for Secure Information Systems, Elsevier, vol. 51, Issue 5, 2009.
-
(2009)
Information and Software Technology, Special Issue on Model Based Development for Secure Information Systems, Elsevier
, vol.51
, Issue.5
-
-
Basin, D.A.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
4
-
-
36048931368
-
USE: A UML-based specification environment for validating UML and OCL
-
DOI 10.1016/j.scico.2007.01.013, PII S0167642307001608, Experimental Software and Toolkits
-
M. Gogolla, F. Büttner, and M. Richters, "USE: A UMLbased specification environment for validating UML and OCL," Sci. Comput. Program., vol. 69, no. 1-3, pp. 27-34, 2007. (Pubitemid 350087238)
-
(2007)
Science of Computer Programming
, vol.69
, Issue.1-3
, pp. 27-34
-
-
Gogolla, M.1
Buttner, F.2
Richters, M.3
-
5
-
-
80455136267
-
-
UML 2.0 OCL specification, OMG document
-
"Object Management Group, UML 2.0 OCL specification, OMG document available at http://www.omg.org/spec/ocl/2.0/," 2003.
-
(2003)
-
-
-
6
-
-
70350143484
-
A rigorous approach to uncovering security policy violations in UML designs
-
IEEE
-
L. Yu, R. France, I. Ray, and S. Ghosh, "A rigorous approach to uncovering security policy violations in UML designs," in Proceedings of the International Conference on Engineering Complex Computer Systems (ICECCS'09). IEEE, 2009.
-
(2009)
Proceedings of the International Conference on Engineering Complex Computer Systems (ICECCS'09)
-
-
Yu, L.1
France, R.2
Ray, I.3
Ghosh, S.4
-
7
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security: From UML Models to Access Control Infrastructures," Proceedings of the ACM Transactions on Software Engineering and Methodology (TOSEM'06), vol. 15, no. 1, pp. 39-91, 2006. (Pubitemid 43947939)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
8
-
-
33144472884
-
Modeling rolebased access control using parameterized UML models
-
LNCS 2984, Springer
-
D. Kim, I. Ray, R. B. France, and N. Li, "Modeling Rolebased Access Control Using Parameterized UML Models," in Proceedings of the Fundamental Approaches to Software Engineering (FASE'04). LNCS 2984, Springer, 2004, pp. 180-193.
-
(2004)
Proceedings of the Fundamental Approaches to Software Engineering (FASE'04)
, pp. 180-193
-
-
Kim, D.1
Ray, I.2
France, R.B.3
Li, N.4
-
10
-
-
56649088001
-
Scenario-based static analysis of UML class models
-
LNCS
-
L. Yu, R. B. France, and I. Ray, "Scenario-based static analysis of UML class models," in MoDELS. LNCS, Vol. 5301, 2008, pp. 234-248.
-
(2008)
MoDELS
, vol.5301
, pp. 234-248
-
-
Yu, L.1
France, R.B.2
Ray, I.3
-
11
-
-
57349119890
-
Enabling verification and conformance testing for access control model
-
ACM Press
-
H. Hu and G.-J. Ahn, "Enabling verification and conformance testing for access control model," in SACMAT. ACM Press, 2008, pp. 195-204.
-
(2008)
SACMAT.
, pp. 195-204
-
-
Hu, H.1
Ahn, G.-J.2
-
12
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
ACM Press
-
A. Schaad and J. D. Moffett, "A lightweight approach to specification and analysis of role-based access control extensions," in Proc. of 7th SACMAT. ACM Press, 2002, pp. 13-22.
-
(2002)
Proc. of 7th SACMAT.
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
13
-
-
70349852260
-
RBAC schema verification using lightweight formal model and constraint analysis
-
J. Zao, H. Wee, J. Chu, and D. Jackson, "RBAC schema verification using lightweight formal model and constraint analysis," in Proceedings of 8th ACM symposium on Access Control Models and Technologies (SACMAT'03), 2003.
-
(2003)
Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT'03)
-
-
Zao, J.1
Wee, H.2
Chu, J.3
Jackson, D.4
-
15
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
DOI 10.1145/505145.505149
-
D. Jackson, "Alloy: A Lightweight Object Modelling Notation," ACM Trans. Softw. Eng. Methodol., vol. 11, no. 2, pp. 256-290, 2002. (Pubitemid 44159313)
-
(2002)
ACM Transactions on Software Engineering and Methodology
, vol.11
, Issue.2
, pp. 256-290
-
-
Jackson, D.1
-
16
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for Role-based Access Control," in ACM Transactions on Information and System Security (TISSEC'-01), 2001, pp. 224-274.
-
(2001)
ACM Transactions on Information and System Security (TISSEC'-01)
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
18
-
-
33646027053
-
Specification and validation of authorisation constraints using UML and OCL
-
ser. LNCS,. Springer
-
K. Sohr, G.-J. Ahn, M. Gogolla, and L. Migge, "Specification and validation of authorisation constraints using UML and OCL," in ESORICS'05, ser. LNCS, vol. 3679. Springer, 2005.
-
(2005)
ESORICS'05
, vol.3679
-
-
Sohr, K.1
Ahn, G.-J.2
Gogolla, M.3
Migge, L.4
-
19
-
-
4143147399
-
Using UML to visualize rolebased access-control constraints
-
ACM Press
-
I. Ray, N. Li, and R. France, "Using UML to visualize rolebased access-control constraints," in Proceedings of the 9th ACM symposium on Access control models and technologies (SACMAT'04). ACM Press, 2004, pp. 115-124.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT'04).
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
-
20
-
-
33751113935
-
Validating the enforcement of access control policies and separation of duty principle in requirement engineering
-
DOI 10.1016/j.infsof.2006.03.009, PII S0950584906000450
-
K. Alghathbar, "Validating the enforcement of access control policies and separation of duty principle in requirement engineering," Information & Software Technology, vol. 49, no. 2, pp. 142-157, 2007. (Pubitemid 44765201)
-
(2007)
Information and Software Technology
, vol.49
, Issue.2
, pp. 142-157
-
-
Alghathbar, K.1
-
23
-
-
33845944921
-
A verifiable formal specification for RBAC model with constraints of separation of duty
-
Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings
-
C. Yuan, Y. He, J. He, and Z. Zhou, "A verifiable formal specification for RBAC model with constraints of separation of duty," in Inscrypt. LCNS 4318, Springer, 2006, pp. 196- 210. (Pubitemid 46030733)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4318
, pp. 196-210
-
-
Yuan, C.1
He, Y.2
He, J.3
Zhou, Y.4
-
24
-
-
77950819431
-
On the modelling and analysis of Amazon Web Services access policies
-
Springer-Verlag LNCS
-
D. Power and M. Slaymaker and A. Simpson, "On the modelling and analysis of Amazon Web Services access policies," in Proceedings of Abstract State Machines, Alloy, B and Z (ABZ 2010). Springer-Verlag LNCS, volume 5977, 2010, p. 394.
-
Proceedings of Abstract State Machines, Alloy, B and Z (ABZ 2010)
, vol.5977
, Issue.2010
, pp. 394
-
-
Power, D.1
Slaymaker, M.2
Simpson, A.3
-
25
-
-
0034586701
-
Some shortcomings of OCL, the object constraint language of UML
-
IEEE
-
M. Vaziri and D. Jackson, "Some shortcomings of OCL, the object constraint language of UML," in TOOLS (34). IEEE, 2000, pp. 555-562.
-
(2000)
TOOLS (34)
, pp. 555-562
-
-
Vaziri, M.1
Jackson, D.2
-
26
-
-
72549094932
-
On challenges of model transformation from UML to Alloy
-
K. Anastasakis, B. Bordbar, G. Georg, and I. Ray, "On challenges of model transformation from UML to Alloy," Software and System Modeling, vol. 9, no. 1, pp. 69-86, 2010.
-
(2010)
Software and System Modeling
, vol.9
, Issue.1
, pp. 69-86
-
-
Anastasakis, K.1
Bordbar, B.2
Georg, G.3
Ray, I.4
-
27
-
-
77956325951
-
Usability of security specification approaches for UML design: A survey
-
C. Talhi, D. Mouheb, V. Lima, M. Debbabi, L. Wang, and M. Pourzandi, "Usability of security specification approaches for UML design: A survey," Journal of Object Technology, vol. 8, no. 6, pp. 102-122, 2009.
-
(2009)
Journal of Object Technology
, vol.8
, Issue.6
, pp. 102-122
-
-
Talhi, C.1
Mouheb, D.2
Lima, V.3
Debbabi, M.4
Wang, L.5
Pourzandi, M.6
-
29
-
-
80455177389
-
-
[Online]
-
"The Alloy Analyzer Quick Guide." [Online]. Available: http://alloy.mit.edu/alloy4/quickguide/index.html
-
The Alloy Analyzer Quick Guide
-
-
|