-
3
-
-
45849085734
-
ATL: A model transformation tool. Science of Computer Programming
-
Jouault, F., Allilaire, F., Bézivin, J., Kurtev, I.: ATL: A model transformation tool. Science of Computer Programming. Science of Computer Programming 72(1-2), 31-39 (2008)
-
(2008)
Science of Computer Programming
, vol.72
, Issue.1-2
, pp. 31-39
-
-
Jouault, F.1
Allilaire, F.2
Bézivin, J.3
Kurtev, I.4
-
4
-
-
67349109419
-
Utilizing Domain Models for Application Design and Validation
-
Reinhartz-Berger, I., Sturm, A.: Utilizing Domain Models for Application Design and Validation. Information & Software Technology 51(8), 1275-1289 (2009)
-
(2009)
Information & Software Technology
, vol.51
, Issue.8
, pp. 1275-1289
-
-
Reinhartz-Berger, I.1
Sturm, A.2
-
5
-
-
33646188481
-
-
Springer-Verlag New York, Inc., Secaucus
-
Schumacher, M.: Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag New York, Inc., Secaucus (2003)
-
(2003)
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
-
-
Schumacher, M.1
-
8
-
-
84911350970
-
-
StringTemplate (2011), http://www.stringtemplate.org/
-
(2011)
-
-
-
9
-
-
84911355680
-
-
TOPCASED (2011), http://www.topcased.org/
-
(2011)
-
-
-
10
-
-
84911353262
-
-
Eclipse (2011), http://www.eclipse.org/
-
(2011)
-
-
-
11
-
-
84863561371
-
-
Dresden OCL Toolkit (2011), http://www.dresden-ocl.org/index.php/ DresdenOCL
-
(2011)
Dresden OCL Toolkit
-
-
-
12
-
-
84911350969
-
-
ATL
-
ATL (2011), http://eclipse.org/atl/
-
(2011)
-
-
-
14
-
-
79960333132
-
A Pattern Based Approach for Secure Database Design
-
Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. Springer, Heidelberg
-
Abramov, J., Sturm, A., Shoval, P.: A Pattern Based Approach for Secure Database Design. In: Salinesi, C., Pastor, O. (eds.) CAiSE Workshops 2011. LNBIP, vol. 83, pp. 637-651. Springer, Heidelberg (2011)
-
(2011)
LNBIP
, vol.83
, pp. 637-651
-
-
Abramov, J.1
Sturm, A.2
Shoval, P.3
-
15
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transaction on Software Engineering and Methodologies 15(1), 39-91 (2006)
-
(2006)
ACM Transaction on Software Engineering and Methodologies
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
16
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
Mouratidis, H., Giorgini, P. (eds.) IDEA Press
-
Fernandez, E.B., Larrondo-Petrie, M.M., Sorgente, T., VanHilst, M.: A methodology to develop secure systems using patterns. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Vision. IDEA Press (2006)
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
VanHilst, M.4
-
17
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
20
-
-
0003880013
-
-
Addison-Wesley Professional
-
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: elements of reusable object-oriented software. Addison-Wesley Professional (1995)
-
(1995)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
22
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
Ray, I., France, R.B., Li, N., Georg, G.: An aspect-based approach to modeling access control concerns. Information & Software Technology 46, 575-587 (2004)
-
(2004)
Information & Software Technology
, vol.46
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
24
-
-
77954504239
-
From goal-driven security requirements engineering to secure design
-
Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. International Journal on Intelligent Systems 25(8), 813-840 (2010)
-
(2010)
International Journal on Intelligent Systems
, vol.25
, Issue.8
, pp. 813-840
-
-
Mouratidis, H.1
Jurjens, J.2
-
25
-
-
33750050331
-
-
John Wiley & Sons
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons (2006)
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
|