메뉴 건너뛰기




Volumn , Issue , 2011, Pages 704-709

Security in model driven development: A survey

Author keywords

[No Author keywords available]

Indexed keywords

EMPIRICAL RESEARCH; EMPIRICAL STUDIES; MODEL DRIVEN DEVELOPMENT;

EID: 80455173460     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.110     Document Type: Conference Paper
Times cited : (15)

References (46)
  • 2
    • 27644524446 scopus 로고    scopus 로고
    • Bridging the gap between software development and information security
    • DOI 10.1109/MSP.2005.118
    • K. R. van Wyk and G. McGraw, "Bridging the gap between software development and information security," IEEE Security & Privacy, vol. 3, no. 5, pp. 75-79, 2005. (Pubitemid 41560450)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 75-79
    • Van Wyk, K.R.1    Mcgraw, G.2
  • 3
    • 85008047921 scopus 로고    scopus 로고
    • Top 10 list [software development]
    • Jan.
    • B. Boehm and V. Basili, "Top 10 list [software development]," Computer, vol. 34, no. 1, pp. 135 -137, Jan. 2001.
    • (2001) Computer , vol.34 , Issue.1 , pp. 135-137
    • Boehm, B.1    Basili, V.2
  • 4
    • 39449099894 scopus 로고    scopus 로고
    • Security requirements for the rest of Us: A survey
    • I. A. Tøndel, M. G. Jaatun, and P. H. Meland, "Security Requirements for the Rest of Us: A Survey," IEEE Software, vol. 25, no. 1, 2008.
    • (2008) IEEE Software , vol.25 , Issue.1
    • Tøndel, I.A.1    Jaatun, M.G.2    Meland, P.H.3
  • 7
    • 27644567603 scopus 로고    scopus 로고
    • Procedures for performing systematic reviews
    • Keele University
    • B. Kitchenham, "Procedures for Performing Systematic Reviews," Keele University, Tech. Rep. TR/SE-0401, 2004.
    • (2004) Tech. Rep. TR/SE-0401
    • Kitchenham, B.1
  • 18
    • 38949134784 scopus 로고    scopus 로고
    • A framework for modelling restricted delegation of rights in the SECTET
    • M. Alam, M. Hafner, R. Breu, and S. Unterthiner, "A framework for modelling restricted delegation of rights in the SECTET," Computer Systems Science and Engineering, vol. 22, no. Compendex, pp. 289-305, 2007. (Pubitemid 351211826)
    • (2007) Computer Systems Science and Engineering , vol.22 , Issue.5 , pp. 289-305
    • Alam, M.1    Hafner, M.2    Breu, R.3    Unterthiner, S.4
  • 19
    • 55049109759 scopus 로고    scopus 로고
    • Model-driven security engineeringfor trust management in SECTET
    • M. Alam, R. Breu, and M. Hafner, "Model-Driven Security Engineeringfor Trust Management in SECTET," Journal of Software, vol. 2, no. 1, 2007.
    • (2007) Journal of Software , vol.2 , Issue.1
    • Alam, M.1    Breu, R.2    Hafner, M.3
  • 35
    • 38049100950 scopus 로고    scopus 로고
    • Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases
    • ser. Lecture Notes in Computer Science, G. Alonso, P. Dadam, and M. Rosemann, Eds.
    • -, "Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases," in Business Process Management, ser. Lecture Notes in Computer Science, G. Alonso, P. Dadam, and M. Rosemann, Eds., 2007, vol. 4714, pp. 408-415.
    • (2007) Business Process Management , vol.4714 , pp. 408-415
    • Rodriguez, A.1    Fernandez-Medina, E.2    Piattini, M.3
  • 36
    • 38049057914 scopus 로고    scopus 로고
    • CIM to PIM transformation: A reality
    • ser. International Federation for Information Processing, L. D. Xu, A. M. Tjoa, and S. S. Chaudhry, Eds. Springer Verlag
    • -, "CIM to PIM transformation: A reality," in Research and Practical Issues of Enterprise Information Systems II, ser. International Federation for Information Processing, L. D. Xu, A. M. Tjoa, and S. S. Chaudhry, Eds. Springer Verlag, 2008, vol. 255, pp. 1239-1249.
    • (2008) Research and Practical Issues of Enterprise Information Systems II , vol.255 , pp. 1239-1249
    • Rodriguez, A.1    Fernandez-Medina, E.2    Piattini, M.3
  • 42
    • 34548787238 scopus 로고    scopus 로고
    • Model-based security engineering of distributed information systems using UMLsec
    • DOI 10.1109/ICSE.2007.55, 4222619, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
    • B. Best, J. Jurjens, and B. Nuseibeh, "Model-Based Security Engineering of Distributed Information Systems Using UMLsec," in Proceedings of the 29th international conference on Software Engineering, ser. ICSE '07, 2007, pp. 581-590. (Pubitemid 47430692)
    • (2007) Proceedings - International Conference on Software Engineering , pp. 581-590
    • Best, B.1    Jurjens, J.2    Nuseibeh, B.3
  • 46
    • 80455138246 scopus 로고    scopus 로고
    • [Online]
    • "CVE - Common Vulnerabilities and Exposures (CVE)." [Online]. Available: http://cve.mitre.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.