-
2
-
-
27644524446
-
Bridging the gap between software development and information security
-
DOI 10.1109/MSP.2005.118
-
K. R. van Wyk and G. McGraw, "Bridging the gap between software development and information security," IEEE Security & Privacy, vol. 3, no. 5, pp. 75-79, 2005. (Pubitemid 41560450)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 75-79
-
-
Van Wyk, K.R.1
Mcgraw, G.2
-
3
-
-
85008047921
-
Top 10 list [software development]
-
Jan.
-
B. Boehm and V. Basili, "Top 10 list [software development]," Computer, vol. 34, no. 1, pp. 135 -137, Jan. 2001.
-
(2001)
Computer
, vol.34
, Issue.1
, pp. 135-137
-
-
Boehm, B.1
Basili, V.2
-
4
-
-
39449099894
-
Security requirements for the rest of Us: A survey
-
I. A. Tøndel, M. G. Jaatun, and P. H. Meland, "Security Requirements for the Rest of Us: A Survey," IEEE Software, vol. 25, no. 1, 2008.
-
(2008)
IEEE Software
, vol.25
, Issue.1
-
-
Tøndel, I.A.1
Jaatun, M.G.2
Meland, P.H.3
-
7
-
-
27644567603
-
Procedures for performing systematic reviews
-
Keele University
-
B. Kitchenham, "Procedures for Performing Systematic Reviews," Keele University, Tech. Rep. TR/SE-0401, 2004.
-
(2004)
Tech. Rep. TR/SE-0401
-
-
Kitchenham, B.1
-
8
-
-
45449103227
-
Applying systematic reviews to diverse study types: An experience report
-
T. Dybå, T. Dingsøyr, and G. K. Hanssen, "Applying Systematic Reviews to Diverse Study Types: An Experience Report," in Proceedings of First International Symposium on Empirical Software Engineering and Measurement, 2007, pp. 225-234.
-
(2007)
Proceedings of First International Symposium on Empirical Software Engineering and Measurement
, pp. 225-234
-
-
Dybå, T.1
Dingsøyr, T.2
Hanssen, G.K.3
-
9
-
-
0242625201
-
Model driven security for process-oriented systems
-
ACM Press
-
D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security for Process-Oriented Systems," in Proceedings of the eighth ACM symposium on Access control models and technologies. ACM Press, 2003, pp. 100-109.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies.
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
10
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
-, "Model driven security: From UML models to access control infrastructures," ACM Transactions on Software Engineering Methodology, vol. 15, no. 1, pp. 39-91, 2006. (Pubitemid 43947939)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
11
-
-
70349862227
-
-
Berlin, Germany: Springer-Verlag
-
M. Clavel, V. Silva, C. Braga, and M. Egea, "Model-Driven Security in Practice: An Industrial Experience." Berlin, Germany: Springer-Verlag, 2008, pp. 326-337.
-
(2008)
Model-Driven Security in Practice: An Industrial Experience
, pp. 326-337
-
-
Clavel, M.1
Silva, V.2
Braga, C.3
Egea, M.4
-
12
-
-
67650243926
-
Model driven security for Web services (MDS4WS)
-
M. M. Alam, R. Breu, and M. Breu, "Model driven security for Web services (MDS4WS)," in Proceedings of 8th International Multitopic Conference, INMIC 2004., 2004, pp. 498-505.
-
(2004)
Proceedings of 8th International Multitopic Conference, INMIC 2004
, pp. 498-505
-
-
Alam, M.M.1
Breu, R.2
Breu, M.3
-
13
-
-
26844470176
-
Model driven security for inter-organizational workflows in e-government
-
E-Government: Towards Electronic Democracy: International Conference, TCGOV 2005. Proceedings
-
R. Breu, M. Hafner, B. Weber, and A. Novak, "Model driven security for inter-organizational workflows in e-government," in E-Government: Towards Electronic Democracy, vol. 3416. Springer Verlag, 2005, pp. 122-133. (Pubitemid 41451179)
-
(2005)
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
, vol.3416
, pp. 122-133
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
Novak, A.4
-
14
-
-
33749063417
-
Modelling interorganizational workflow security in a peer-to-peer environment
-
M. Hafner, M. Breu, R. Breu, and A. Nowak, "Modelling interorganizational workflow security in a peer-to-peer environment," in Proceedings of International Conference on Web Services. ICWS 2005., 2005, p. 540.
-
(2005)
Proceedings of International Conference on Web Services. ICWS 2005
, pp. 540
-
-
Hafner, M.1
Breu, M.2
Breu, R.3
Nowak, A.4
-
16
-
-
60849115033
-
A constraint based role based access control in the SECTET a model-driven approach
-
ACM
-
M. Alam, M. Hafner, and R. Breu, "A constraint based role based access control in the SECTET a model-driven approach," in Proceedings of the 2006 International Conference on Privacy, Security and Trust. ACM, 2006, pp. 1-13.
-
(2006)
Proceedings of the 2006 International Conference on Privacy, Security and Trust
, pp. 1-13
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
17
-
-
84894679452
-
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET
-
ACM
-
-, "Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET," in Proceedings of the 2006 International Conference on Privacy, Security and Trust. ACM, 2006, pp. 1-5.
-
(2006)
Proceedings of the 2006 International Conference on Privacy, Security and Trust
, pp. 1-5
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
18
-
-
38949134784
-
A framework for modelling restricted delegation of rights in the SECTET
-
M. Alam, M. Hafner, R. Breu, and S. Unterthiner, "A framework for modelling restricted delegation of rights in the SECTET," Computer Systems Science and Engineering, vol. 22, no. Compendex, pp. 289-305, 2007. (Pubitemid 351211826)
-
(2007)
Computer Systems Science and Engineering
, vol.22
, Issue.5
, pp. 289-305
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
Unterthiner, S.4
-
19
-
-
55049109759
-
Model-driven security engineeringfor trust management in SECTET
-
M. Alam, R. Breu, and M. Hafner, "Model-Driven Security Engineeringfor Trust Management in SECTET," Journal of Software, vol. 2, no. 1, 2007.
-
(2007)
Journal of Software
, vol.2
, Issue.1
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
20
-
-
47949132086
-
A model-driven framework for trusted computing based systems
-
M. Alam, J. P. Seifert, and Z. Xinwen, "A Model-Driven Framework for Trusted Computing Based Systems," in 11th IEEE International Enterprise Distributed Object Computing Conference. EDOC 2007., 2007, pp. 75-75.
-
(2007)
11th IEEE International Enterprise Distributed Object Computing Conference. EDOC 2007
, pp. 75-75
-
-
Alam, M.1
Seifert, J.P.2
Xinwen, Z.3
-
21
-
-
33750315310
-
Towards a MOF/QVT-based domain architecture for model driven security
-
Model Driven Engineering Languages and Systems - 9th International Conference, MoDELS 2006, Proceedings
-
M. Hafner, M. Alam, and R. Breu, "Towards a MOF/QVT-based domain architecture for model driven security," in Proceedings of 9th International Conference on Model Driven Engineering Languages and Systems, MoDELS 2006, vol. 4199 LNCS. Springer Verlag, 2006, pp. 275-290. (Pubitemid 44618565)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4199
, pp. 275-290
-
-
Hafner, M.1
Alam, M.2
Breu, R.3
-
22
-
-
60849106337
-
Model-Driven Development for secure information systems
-
E. Fernandez-Medina, J. Jurjens, J. Trujillo, and S. Jajodia, "Model-Driven Development for secure information systems," Information and Software Technology, vol. 51, pp. 809-814, 2009.
-
(2009)
Information and Software Technology
, vol.51
, pp. 809-814
-
-
Fernandez-Medina, E.1
Jurjens, J.2
Trujillo, J.3
Jajodia, S.4
-
23
-
-
34548165075
-
A framework for the development of secure data warehouses based on MDA and QVT
-
E. Soler, J. Trujillo, E. Fernandez-Medina, and M. Piattini, "A framework for the development of secure data warehouses based on MDA and QVT," in Proceedings of Second International Conference on Availability, Reliability and Security, ARES 2007:, 2007, pp. 294-300.
-
(2007)
Proceedings of Second International Conference on Availability, Reliability and Security, ARES 2007
, pp. 294-300
-
-
Soler, E.1
Trujillo, J.2
Fernandez-Medina, E.3
Piattini, M.4
-
26
-
-
49049092179
-
Implementing multidimensional security into olap tools
-
C. Blanco, E. Fernandez-Medina, J. Trujillo, and M. Piattini, "Implementing multidimensional security into olap tools," in Proceedings of 3rd International Conference on Availability, Security, and Reliability, ARES 2008, 2008, pp. 1248-1253.
-
(2008)
Proceedings of 3rd International Conference on Availability, Security, and Reliability, ARES 2008
, pp. 1248-1253
-
-
Blanco, C.1
Fernandez-Medina, E.2
Trujillo, J.3
Piattini, M.4
-
27
-
-
85099426156
-
Automatic generation of secure multidimensional code for data warehouses: An MDA approach
-
Springer Verlag
-
C. Blanco, I. G. R. de Guzman, E. Fernandez-Medina, J. Trujillo, and M. Piattini, "Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach," in On the Move to Meaningful Internet Systems, vol. 5332. Springer Verlag, 2008, pp. 1052-1068.
-
(2008)
On the Move to Meaningful Internet Systems
, vol.5332
, pp. 1052-1068
-
-
Blanco, C.1
De Guzman, I.G.R.2
Fernandez-Medina, E.3
Trujillo, J.4
Piattini, M.5
-
28
-
-
69949118455
-
Designing secure data warehouses by using MDA and QVT
-
E. Soler, J. Trujillo, C. Blanco, and E. Fernandez-Medina, "Designing Secure Data Warehouses by Using MDA and QVT," Journal of Universal Computer Science, vol. 15, no. 8, pp. 1607-1641, 2009.
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.8
, pp. 1607-1641
-
-
Soler, E.1
Trujillo, J.2
Blanco, C.3
Fernandez-Medina, E.4
-
29
-
-
49049087177
-
Towards comprehensive requirement analysis for data warehouses: Considering security requirements
-
E. Soler, V. Stefanov, J.-N. Mazon, J. Trujillo, E. Fernandez-Madina, and M. Piattini, "Towards comprehensive requirement analysis for data warehouses: Considering security requirements," in Proceedings of Third International Conference on Availability, Reliability and Security, ARES2008, 2008, pp. 104-111.
-
(2008)
Proceedings of Third International Conference on Availability, Reliability and Security, ARES2008
, pp. 104-111
-
-
Soler, E.1
Stefanov, V.2
Mazon, J.-N.3
Trujillo, J.4
Fernandez-Madina, E.5
Piattini, M.6
-
30
-
-
67349151119
-
A UML 2.0 profile to define security requirements for Data Warehouses
-
J. Trujillo, E. Soler, E. Fernandez-Medina, and M. Piattini, "A UML 2.0 profile to define security requirements for Data Warehouses," Computer Standards & Interfaces, vol. 31, no. 5, pp. 969-983, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.5
, pp. 969-983
-
-
Trujillo, J.1
Soler, E.2
Fernandez-Medina, E.3
Piattini, M.4
-
31
-
-
70349321266
-
Towards a modernization process for secure data warehouses
-
Springer-Verlag
-
C. Blanco, R. Perez-Castillo, A. Hernandez, E. Fernandez-Medina, and J. Trujillo, "Towards a Modernization Process for Secure Data Warehouses," in Data Warehousing and Knowledge Discovery. Springer-Verlag, 2009, pp. 24-35.
-
(2009)
Data Warehousing and Knowledge Discovery
, pp. 24-35
-
-
Blanco, C.1
Perez-Castillo, R.2
Hernandez, A.3
Fernandez-Medina, E.4
Trujillo, J.5
-
32
-
-
62349117518
-
An engineering process for developing Secure Data Warehouses
-
J. Trujillo, E. Soler, E. Fernandez-Medina, and M. Piattini, "An engineering process for developing Secure Data Warehouses," Information and Software Technology, vol. 51, pp. 1033-1051, 2009.
-
(2009)
Information and Software Technology
, vol.51
, pp. 1033-1051
-
-
Trujillo, J.1
Soler, E.2
Fernandez-Medina, E.3
Piattini, M.4
-
33
-
-
33750083883
-
Towards a UML 2.0 extension for the modeling of security requirements in business processes
-
Trust and Privacy in Digital Business - Third International Conference, TrustBus 2006, Proceedings
-
A. Rodriguez, E. Fernandez-Medina, and M. Piattini, "Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes," in Trust and Privacy in Digital Business. Springer Verlag, 2006, pp. 51-61. (Pubitemid 44577491)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4083
, pp. 51-61
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
34
-
-
33750940979
-
Security requirement with a UML 2.0 profile
-
-, "Security requirement with a UML 2.0 profile," in The First International Conference on Availability, Reliability and Security, 2006. ARES 2006., 2006, p. 8 pp.
-
(2006)
The First International Conference on Availability, Reliability and Security, 2006. ARES 2006
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
35
-
-
38049100950
-
Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases
-
ser. Lecture Notes in Computer Science, G. Alonso, P. Dadam, and M. Rosemann, Eds.
-
-, "Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases," in Business Process Management, ser. Lecture Notes in Computer Science, G. Alonso, P. Dadam, and M. Rosemann, Eds., 2007, vol. 4714, pp. 408-415.
-
(2007)
Business Process Management
, vol.4714
, pp. 408-415
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
36
-
-
38049057914
-
CIM to PIM transformation: A reality
-
ser. International Federation for Information Processing, L. D. Xu, A. M. Tjoa, and S. S. Chaudhry, Eds. Springer Verlag
-
-, "CIM to PIM transformation: A reality," in Research and Practical Issues of Enterprise Information Systems II, ser. International Federation for Information Processing, L. D. Xu, A. M. Tjoa, and S. S. Chaudhry, Eds. Springer Verlag, 2008, vol. 255, pp. 1239-1249.
-
(2008)
Research and Practical Issues of Enterprise Information Systems II
, vol.255
, pp. 1239-1249
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
37
-
-
70349673753
-
SecureMDD: A model-driven development method for secure smart card applications
-
N. Moebius, K. Stenzel, H. Grandy, and W. Reif, "SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications," in International Conference on Availability, Reliability and Security ARES '09., 2009, pp. 841-846.
-
(2009)
International Conference on Availability, Reliability and Security ARES '09
, pp. 841-846
-
-
Moebius, N.1
Stenzel, K.2
Grandy, H.3
Reif, W.4
-
39
-
-
70349931810
-
Generating formal specifications for security-critical applications - A model-driven approach
-
N. Moebius, K. Stenzel, and W. Reif, "Generating formal specifications for security-critical applications - a model-driven approach," in ICSE Workshop on Software Engineering for Secure Systems, 2009. SESS '09., 2009, pp. 68-74.
-
(2009)
ICSE Workshop on Software Engineering for Secure Systems, 2009. SESS '09
, pp. 68-74
-
-
Moebius, N.1
Stenzel, K.2
Reif, W.3
-
42
-
-
34548787238
-
Model-based security engineering of distributed information systems using UMLsec
-
DOI 10.1109/ICSE.2007.55, 4222619, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
B. Best, J. Jurjens, and B. Nuseibeh, "Model-Based Security Engineering of Distributed Information Systems Using UMLsec," in Proceedings of the 29th international conference on Software Engineering, ser. ICSE '07, 2007, pp. 581-590. (Pubitemid 47430692)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 581-590
-
-
Best, B.1
Jurjens, J.2
Nuseibeh, B.3
-
43
-
-
57349126199
-
Model-based security analysis for mobile communications
-
ser. ICSE '08. ACM
-
J. Jürjens, J. Schreck, and P. Bartmann, "Model-based security analysis for mobile communications," in Proceedings of the 30th international conference on Software engineering, ser. ICSE '08. ACM, 2008, pp. 683-692.
-
(2008)
Proceedings of the 30th International Conference on Software Engineering
, pp. 683-692
-
-
Jürjens, J.1
Schreck, J.2
Bartmann, P.3
-
46
-
-
80455138246
-
-
[Online]
-
"CVE - Common Vulnerabilities and Exposures (CVE)." [Online]. Available: http://cve.mitre.org/
-
-
-
|