메뉴 건너뛰기




Volumn , Issue , 2009, Pages

An aspect-oriented approach for software security hardening: From design to implementation

Author keywords

Aspect oriented modeling; Aspect oriented programming; Security hardening; Security patterns; Security requirements; UML design

Indexed keywords

ASPECT ORIENTED MODELING; ASPECT-ORIENTED; SECURITY HARDENING; SECURITY PATTERNS; SECURITY REQUIREMENTS; UML DESIGN;

EID: 84861670663     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (48)
  • 4
    • 84861663183 scopus 로고    scopus 로고
    • Last visited: September 2008
    • Aspect-Oriented Modeling Workshop. http://www.aspect-modeling.org/Last visited: September 2008.
    • Aspect-Oriented Modeling Workshop
  • 8
    • 33746393691 scopus 로고    scopus 로고
    • Security design patterns
    • members of The Open Group Security Forum, Open Group
    • B. Blakley, C. Heath, and members of The Open Group Security Forum. Security Design Patterns. Technical Report G031, Open Group, 2004.
    • (2004) Technical Report G031
    • Blakley, B.1    Heath, C.2
  • 13
    • 34548634452 scopus 로고    scopus 로고
    • A meta-level specification and profile for aspectj in UML
    • J. Evermann. A Meta-Level Specification and Profile for AspectJ in UML. Journal of Object Technology, 6(7):27-49, 2007.
    • (2007) Journal of Object Technology , vol.6 , Issue.7 , pp. 27-49
    • Evermann, J.1
  • 19
    • 84861673506 scopus 로고    scopus 로고
    • Last visited: September 2008
    • IBM-Rational Software Architect http://www.ibm.com/software/awdtools/ architect/swarchitect/. Last visited: September 2008.
    • Ibm-Rational, S.A.1
  • 26
    • 23944488270 scopus 로고    scopus 로고
    • For-LySa: UML for authentication analysis
    • Global Computing - IST/FET International Workshop, GC 2004
    • C. Montangero, M. Buchholtz, L. Perrone, and S. Semprini. For-LySa: UML for Authentication Analysis. In Global Computing: IST/FET International Workshop (GC'2004), volume 3267 of LNCS, pages 93-106. Springer Verlag, 2005. (Pubitemid 41190441)
    • (2005) Lecture Notes in Computer Science , vol.3267 , pp. 93-106
    • Buchholtz, M.1    Montangero, C.2    Perrone, L.3    Semprini, S.4
  • 27
    • 34548260272 scopus 로고    scopus 로고
    • Formalization of an aspect-oriented modeling approach
    • Hamilton, ON
    • F. Mostefaoui and J. Vachon. Formalization of an Aspect-Oriented Modeling Approach. In Proceedings of Formal Methods, Hamilton, ON, 2006.
    • (2006) Proceedings of Formal Methods
    • Mostefaoui, F.1    Vachon, J.2
  • 31
    • 1542700278 scopus 로고    scopus 로고
    • Object Management Group (OMG)
    • Object Management Group (OMG). MDA Guide, Version 1.0.1, 2003.
    • (2003) MDA Guide, Version 1.0.1
  • 36
    • 26444453610 scopus 로고    scopus 로고
    • Role slices: A notation for RBAC permission assignment and enforcement
    • Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Proceedings
    • J. Pavlich-Mariscal, T. Doan, L. Michel, S. Demurjian, and T. Ting. Role Slices: A Notation for RBAC Permission Assignment and Enforcement. In Proceedings of the 19th Annual IFIP WG 11.3, pages 40-53, Connecticut, U.S.A, 2005. (Pubitemid 41436205)
    • (2005) Lecture Notes in Computer Science , vol.3654 , pp. 40-53
    • Pavlich-Mariscal, J.A.1    Doan, T.2    Michel, L.3    Demurjian, S.A.4    Ting, T.C.5
  • 39
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • I. Ray, R. France, N. Li, and G. Georg. An Aspect-Based Approach to Modeling Access Control Concerns. Information and Software Technology, 46(9):575-587, 2004.
    • (2004) Information and Software Technology , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.2    Li, N.3    Georg, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.