-
1
-
-
84961578672
-
Tool support for enforcing security policies on databases
-
J. Abramov, O. Anson, A. Sturm, and P. Shoval Tool support for enforcing security policies on databases CAiSE Forum 2011 2011 41 48
-
(2011)
CAiSE Forum
, vol.2011
, pp. 41-48
-
-
Abramov, J.1
Anson, O.2
Sturm, A.3
Shoval, P.4
-
2
-
-
79960333132
-
-
Springer Berlin, Heidelberg pp. 637-651
-
J. Abramov, A. Sturm, and P. Shoval A Pattern based Approach for Secure Database Design, CAiSE Workshops 2011, LNBIP 83(10) 2011 Springer Berlin, Heidelberg pp. 637-651
-
(2011)
A Pattern Based Approach for Secure Database Design, CAiSE Workshops 2011, LNBIP 83(10)
-
-
Abramov, J.1
Sturm, A.2
Shoval, P.3
-
4
-
-
60849104397
-
Automated analysis of security-design models
-
D. Basin, M. Clavel, J. Doser, and M. Egea Automated analysis of security-design models Information and Software Technology 51 5 2009 815 831
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
6
-
-
79951813796
-
A systematic review of evaluation of variability management approaches in software product lines
-
L. Chen, and M.A. Babar A systematic review of evaluation of variability management approaches in software product lines Information and Software Technology 53 2011 344 362
-
(2011)
Information and Software Technology
, vol.53
, pp. 344-362
-
-
Chen, L.1
Babar, M.A.2
-
7
-
-
58849148475
-
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
-
L. Compagna, P.E. Khoury, A. Krausová, F. Massacci, and N. Zannone How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns Artificial Intelligence and Law 17 1 2009 1 30
-
(2009)
Artificial Intelligence and Law
, vol.17
, Issue.1
, pp. 1-30
-
-
Compagna, L.1
Khoury, P.E.2
Krausová, A.3
Massacci, F.4
Zannone, N.5
-
10
-
-
56749124990
-
Secure activity resource coordination: Empirical evidence of enhanced security awareness in designing secure business processes
-
F. D'aubeterre, R. Singh, and L. Iyer Secure activity resource coordination: empirical evidence of enhanced security awareness in designing secure business processes European Journal of Information Systems 17 5 2008 528 542
-
(2008)
European Journal of Information Systems
, vol.17
, Issue.5
, pp. 528-542
-
-
D'Aubeterre, F.1
Singh, R.2
Iyer, L.3
-
12
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
H. Mouratidis, P. Giorgini, IDEA Press (Chapter 5)
-
E.B. Fernandez, M.M. Larrondo-Petrie, T. Sorgente, and M. VanHilst A methodology to develop secure systems using patterns H. Mouratidis, P. Giorgini, Integrating Security and Software Engineering: Advances and Future Vision 2006 IDEA Press 107 126 (Chapter 5)
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Vanhilst, M.4
-
14
-
-
0003880013
-
-
Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
E. Gamma, R. Helm, R. Johnson, and J.M. Vlissides Design Patterns: Elements of Reusable Object-Oriented Software 1994 Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
(1994)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.M.4
-
17
-
-
55049118116
-
Model-based security analysis of the German health card architecture
-
J. Jürjens, and R. Rumm Model-based security analysis of the German health card architecture Methods of Information in Medicine 47 5 2008 409 416
-
(2008)
Methods of Information in Medicine
, vol.47
, Issue.5
, pp. 409-416
-
-
Jürjens, J.1
Rumm, R.2
-
18
-
-
37849187634
-
UML specification of access control policies and their formal verification
-
M. Koch, and F. Parisi-Presicce UML specification of access control policies and their formal verification Software and System Modeling 5 4 2006 429 447
-
(2006)
Software and System Modeling
, vol.5
, Issue.4
, pp. 429-447
-
-
Koch, M.1
Parisi-Presicce, F.2
-
20
-
-
0242592090
-
Why a diagram is (sometimes) worth ten thousand words
-
J.H. Larkin, and H.A. Simon Why a diagram is (sometimes) worth ten thousand words Cognitive Science 11 1 1987 65 100
-
(1987)
Cognitive Science
, vol.11
, Issue.1
, pp. 65-100
-
-
Larkin, J.H.1
Simon, H.A.2
-
21
-
-
77949773912
-
Special issue on software engineering for secure systems
-
S.W. Lee, and M. Monga Special issue on software engineering for secure systems Computers & Security 29 2010 299 301
-
(2010)
Computers & Security
, vol.29
, pp. 299-301
-
-
Lee, S.W.1
Monga, M.2
-
23
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
J. Jézéquel, H. Hußmann, S. Cook, LNCS Springer-Verlag London
-
T. Lodderstedt, D.A. Basin, and J. Doser SecureUML: a UML-based modeling language for model-driven security J. Jézéquel, H. Hußmann, S. Cook, Proceedings of the 5th International Conference on the Unified Modeling Language LNCS vol. 2460 2002 Springer-Verlag London 426 441
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
24
-
-
33746078483
-
Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank
-
P. Giorgini, N.A.M. Maiden, J. Mylopoulos, E. Yu, MIT Press Cambridge, MA
-
F. Massacci, and N. Zannone Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank P. Giorgini, N.A.M. Maiden, J. Mylopoulos, E. Yu, Social Modeling for Requirements Engineering 2006 MIT Press Cambridge, MA
-
(2006)
Social Modeling for Requirements Engineering
-
-
Massacci, F.1
Zannone, N.2
-
25
-
-
78649774668
-
Tool support for code generation from a UMLsec property
-
L. Montrieux, J. Jürjens, C.B. Haley, Y. Yu, P.-Y. Schobbens, H. Toussaint, Tool support for code generation from a UMLsec property, in: The 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010, pp. 357-358.
-
(2010)
The 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10)
, pp. 357-358
-
-
L. Montrieux1
-
26
-
-
84888990373
-
What makes a good diagram? Improving the cognitive effectiveness of diagrams in IS development
-
W. Wojtkowski, W.G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Springer US
-
D. Moody What makes a good diagram? Improving the cognitive effectiveness of diagrams in IS development W. Wojtkowski, W.G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Advances in Information Systems Development 2007 Springer US 481 492
-
(2007)
Advances in Information Systems Development
, pp. 481-492
-
-
Moody, D.1
-
29
-
-
69849091259
-
Secure information systems engineering: Experiences and lessons learned from two health care projects
-
P. Van Eck, J. Gordijn, R. Wieringa, LNCS Springer Berlin/Heidelberg, London
-
H. Mouratidis, A. Sunyaev, and J. Jürjens Secure information systems engineering: experiences and lessons learned from two health care projects P. Van Eck, J. Gordijn, R. Wieringa, Advanced Information Systems Engineering LNCS vol. 5565 2009 Springer Berlin/Heidelberg, London 231 245
-
(2009)
Advanced Information Systems Engineering
, vol.5565
, pp. 231-245
-
-
Mouratidis, H.1
Sunyaev, A.2
Jürjens, J.3
-
31
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
A.L. Opdahl, and G. Sindre Experimental comparison of attack trees and misuse cases for security threat identification Information and Software Technology 51 5 2009 916 932
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
32
-
-
84861945642
-
-
Oracle
-
Oracle, 2011. < http://www.oracle.com >.
-
(2011)
-
-
-
33
-
-
84861945644
-
-
Oracle: Oracle@Database - Security Guide
-
Oracle: Oracle@Database - Security Guide, 2008. < http://download. oracle.com/docs/cd/B28359-01/network.111/b28531.pdf >.
-
(2008)
-
-
-
34
-
-
77949562741
-
A framework of composable access control features: Preserving separation of access control concerns from models to code
-
J.A. Pavlich-Mariscal, S.A. Demurjian, and L.D. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Computers & Security 29 3 2010 350 379
-
(2010)
Computers & Security
, vol.29
, Issue.3
, pp. 350-379
-
-
Pavlich-Mariscal, J.A.1
Demurjian, S.A.2
Michel, L.D.3
-
35
-
-
0035670715
-
A controlled experiment in maintenance comparing design patterns to simpler solutions
-
L. Prechelt, B. Unger, W.F. Tichy, P. Brössler, and L.G. Votta A controlled experiment in maintenance comparing design patterns to simpler solutions IEEE Transactions on Software Engineering 27 12 2001 1134 1144
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.12
, pp. 1134-1144
-
-
Prechelt, L.1
Unger, B.2
Tichy, W.F.3
Brössler, P.4
Votta, L.G.5
-
36
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
I. Ray, R.B. France, N. Li, and G. Georg An aspect-based approach to modeling access control concerns Information and Software Technology 46 9 2004 575 587
-
(2004)
Information and Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
38
-
-
67349109419
-
Utilizing domain models for application design and validation
-
I. Reinhartz-Berger, and A. Sturm Utilizing domain models for application design and validation Information & Software Technology 51 8 2009 1275 1289
-
(2009)
Information & Software Technology
, vol.51
, Issue.8
, pp. 1275-1289
-
-
Reinhartz-Berger, I.1
Sturm, A.2
-
39
-
-
84874765620
-
Connecting security requirements analysis and secure design using patterns and UMLsec
-
H. Schmidt, and J. Jürjens Connecting security requirements analysis and secure design using patterns and UMLsec CAiSE 2011 2011 367 382
-
(2011)
CAiSE
, vol.2011
, pp. 367-382
-
-
Schmidt, H.1
Jürjens, J.2
-
41
-
-
33646188481
-
-
Springer-Verlag New York, Inc. Secaucus, NJ, USA
-
M. Schumacher Security Engineering with Patterns: Origins, Theoretical Models, and New Applications 2003 Springer-Verlag New York, Inc. Secaucus, NJ, USA
-
(2003)
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
-
-
Schumacher, M.1
-
42
-
-
0141725660
-
The pragmatics of model-driven development
-
B. Selic The pragmatics of model-driven development IEEE Software 20 5 2003 19 25
-
(2003)
IEEE Software
, vol.20
, Issue.5
, pp. 19-25
-
-
Selic, B.1
-
43
-
-
84861956909
-
-
SERENITY Project
-
SERENITY Project, 2011. < http://www.serenity-project.org >.
-
(2011)
-
-
-
44
-
-
0031078530
-
Entity-relationship and object-oriented data modeling - An experimental comparison of design quality
-
P. Shoval, and S. Shiran Entity-relationship and object-oriented data modeling - an experimental comparison of design quality Data & Knowledge Engineering 21 1997 297 315
-
(1997)
Data & Knowledge Engineering
, vol.21
, pp. 297-315
-
-
Shoval, P.1
Shiran, S.2
-
45
-
-
3543080954
-
A controlled experiment comparing the maintainability of programs designed with and without design patterns - A replication in a real programming environment
-
M. Vokáč, W. Tichy, D.I.K. Sjoberg, E. Arisholm, and M. Aldrin A controlled experiment comparing the maintainability of programs designed with and without design patterns - a replication in a real programming environment Empirical Software Engineering 9 3 2004 149 195
-
(2004)
Empirical Software Engineering
, vol.9
, Issue.3
, pp. 149-195
-
-
Vokáč, M.1
Tichy, W.2
Sjoberg, D.I.K.3
Arisholm, E.4
Aldrin, M.5
-
46
-
-
0003639957
-
-
Kluwer Academic Publishers
-
C. Wohlin, P. Runeson, M. Höst, M.C. Ohlsson, B. Regnell, and A. Wesslén Experimentation in Software Engineering: An Introduction 2000 Kluwer Academic Publishers
-
(2000)
Experimentation in Software Engineering: An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.C.4
Regnell, B.5
Wesslén, A.6
-
48
-
-
84867330357
-
What do we know about the effectiveness of software design patterns
-
10.1109/TSE.2011.79
-
C. Zhang, and D. Budgen What do we know about the effectiveness of software design patterns IEEE Transactions on Software Engineering 2011 10.1109/TSE.2011.79
-
(2011)
IEEE Transactions on Software Engineering
-
-
Zhang, C.1
Budgen, D.2
|