-
1
-
-
84890716484
-
Tool support for enforcing security policies on databases
-
CEUR-WS
-
J. Abramov, O. Anson, A. Sturm, and P. Shoval Tool support for enforcing security policies on databases CAiSE Forum 2011 41 48 CEUR-WS
-
(2011)
CAiSE Forum
, pp. 41-48
-
-
Abramov, J.1
Anson, O.2
Sturm, A.3
Shoval, P.4
-
4
-
-
33751113935
-
Validating the enforcement of access control policies and separation of duty principle in requirement engineering
-
DOI 10.1016/j.infsof.2006.03.009, PII S0950584906000450
-
K. Alghathbar Validating the enforcement of access control policies and separation of duty principle in requirement engineering Information & Software Technology 49 2007 142 157 (Pubitemid 44765201)
-
(2007)
Information and Software Technology
, vol.49
, Issue.2
, pp. 142-157
-
-
Alghathbar, K.1
-
11
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
H. Mouratidis, P. Giorgini, IDEA Press
-
E.B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst A methodology to develop secure systems using patterns H. Mouratidis, P. Giorgini, Integrating security and software engineering: advances and future vision 2006 IDEA Press
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Vanhilst, M.4
-
14
-
-
77954026152
-
Separating application and security concerns in use case models
-
ACM
-
H. Gomaa, and M.E. Shin Separating application and security concerns in use case models 15th workshop on Earlt aspects 2009 ACM 1 6
-
(2009)
15th Workshop on Earlt Aspects
, pp. 1-6
-
-
Gomaa, H.1
Shin, M.E.2
-
17
-
-
45849085734
-
A model transformation tool
-
F. Jouault, F. Allilaire, J. Bézivin, and I.A.T.L. Kurtev A model transformation tool Science of Computer Programming 72 1-2 2008 31 39
-
(2008)
Science of Computer Programming
, vol.72
, Issue.12
, pp. 31-39
-
-
Jouault, F.1
Allilaire, F.2
Bézivin, J.3
Kurtev, I.A.T.L.4
-
20
-
-
37849187634
-
UML specification of access control policies and their formal verification
-
DOI 10.1007/s10270-006-0030-z
-
M. Koch, and F. Parisi-Presicce UML specification of access control policies and their formal verification Software and System Modeling 5 2006 429 447 (Pubitemid 44824555)
-
(2006)
Software and Systems Modeling
, vol.5
, Issue.4
, pp. 429-447
-
-
Koch, M.1
Parisi-Presicce, F.2
-
24
-
-
84907324157
-
-
OMG version 2.2,; [last accessed: December 2010]
-
OMG. Object constraint language, version 2.2, http://www.omg.org/spec/ OCL/2.2/; [last accessed: December 2010].
-
Object Constraint Language
-
-
-
25
-
-
84859432536
-
-
[last accessed: December 2011]
-
Oracle: Oracle@database - security guide, http://download.oracle.com/ docs/cd/B28359-01/network.111/b28531.pdf; [last accessed: December 2011].
-
Oracle: Oracle@database - Security Guide
-
-
-
26
-
-
77949562741
-
A framework of composable access control features: Preserving separation of access control concerns from models to code
-
J.A. Pavlich-Mariscal, S.A. Demurjian, and L.D. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Computers & Security 29 2010 350 379
-
(2010)
Computers & Security
, vol.29
, pp. 350-379
-
-
Pavlich-Mariscal, J.A.1
Demurjian, S.A.2
Michel, L.D.3
-
29
-
-
67349109419
-
Utilizing domain models for application design and validation
-
I. Reinhartz-Berger, and A. Sturm Utilizing domain models for application design and validation Information & Software Technology 51 2009 1275 1289
-
(2009)
Information & Software Technology
, vol.51
, pp. 1275-1289
-
-
Reinhartz-Berger, I.1
Sturm, A.2
-
32
-
-
0141725660
-
The pragmatics of model-driven development. Software
-
B. Selic The pragmatics of model-driven development. Software IEEE software 20 5 2003 19 25
-
(2003)
IEEE Software
, vol.20
, Issue.5
, pp. 19-25
-
-
Selic, B.1
-
33
-
-
0023862401
-
ADISSA: Architectural design of information systems based on structured analysis
-
DOI 10.1016/0306-4379(88)90016-6
-
P. Shoval ADISSA: architectural design of information systems based on structured analysis Information Systems 13 1988 193 210 (Pubitemid 18650393)
-
(1988)
Information Systems
, vol.13
, Issue.2
, pp. 193-210
-
-
Shoval Peretz1
-
35
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engieering 10 1 2005 34 44
-
(2005)
Requirements Engieering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
36
-
-
84940436173
-
-
[last accessed: December 2010]
-
StringTemplate, http://www.stringtemplate.org/; [last accessed: December 2010].
-
StringTemplate
-
-
-
37
-
-
84859424170
-
-
[last accessed: December 2010]
-
TOPCASED, www.topcased.org; [last accessed: December 2010].
-
Topcased
-
-
|