-
2
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology 15, 39-91 (2006)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
3
-
-
38949158021
-
Security conscious web service composition
-
IEEE Computer Society, Los Alamitos
-
Carminati, B., Ferrari, E., Hung, P.: Security Conscious Web Service Composition. In: International Conference on Web Services (ICWS), pp. 489-496. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
International Conference on Web Services (ICWS)
, pp. 489-496
-
-
Carminati, B.1
Ferrari, E.2
Hung, P.3
-
4
-
-
51749117380
-
Security specifcation at process level
-
IEEE Computer Society, Washington, DC
-
Chollet, S., Lalanda, P.: Security specifcation at process level. In: SCC 2008: Proceedings of the 2008 IEEE International Conference on Services Computing, pp. 165-172. IEEE Computer Society, Washington, DC (2008)
-
(2008)
SCC 2008: Proceedings of the 2008 IEEE International Conference on Services Computing
, pp. 165-172
-
-
Chollet, S.1
Lalanda, P.2
-
5
-
-
0031675458
-
APEL: A graphical yet executable formalism for process modeling
-
Dami, S., Estublier, J., Amiour, M.: APEL: A Graphical Yet Executable Formalism for Process Modeling. Automated Software Engg. 5(1), 61-96 (1998)
-
(1998)
Automated Software Engg.
, vol.5
, Issue.1
, pp. 61-96
-
-
Dami, S.1
Estublier, J.2
Amiour, M.3
-
6
-
-
0001449325
-
Temporal and modal logic
-
van Leeuwen, J. (ed.). MIT Press
-
Emerson, E.A.: Temporal and modal logic. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. B, pp. 995-1072. MIT Press (1990)
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 995-1072
-
-
Emerson, E.A.1
-
8
-
-
52149087424
-
Ontology-based security policies for supporting the management of web service business processes
-
Garcia, D.Z.G., de Toledo, M.B.F.: Ontology-based security policies for supporting the management of web service business processes. In: ICSC, pp. 331-338 (2008)
-
(2008)
ICSC
, pp. 331-338
-
-
Garcia, D.Z.G.1
De Toledo, M.B.F.2
-
9
-
-
0034627950
-
Specification in ctl + past for verification in ctl
-
Laroussinie, F., Schnoebelen, P.: Specification in ctl + past for verification in ctl. Inf. Comput. 156, 236-263 (2000)
-
(2000)
Inf. Comput.
, vol.156
, pp. 236-263
-
-
Laroussinie, F.1
Schnoebelen, P.2
-
10
-
-
35248898039
-
Model driven service composition
-
Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.). Springer, Heidelberg
-
Orriëns, B., Yang, J., Papazoglou, M.P.: Model Driven Service Composition. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, pp. 75-90. Springer, Heidelberg (2003)
-
(2003)
ICSOC 2003. LNCS
, vol.2910
, pp. 75-90
-
-
Orriëns, B.1
Yang, J.2
Papazoglou, M.P.3
-
12
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
Rodríguez, A., Fernández-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE -Transactions on Information and Systems E90-D(4), 745-752 (2007)
-
(2007)
IEICE -Transactions on Information and Systems
, vol.E90-D
, Issue.4
, pp. 745-752
-
-
Rodríguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
13
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Focardi, R., Gorrieri, R. (eds.). Springer, Heidelberg
-
Samarati, P., de Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137-196. Springer, Heidelberg (2001)
-
(2001)
FOSAD 2000. LNCS
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
14
-
-
75649103577
-
Incorporating security requirements into service composition: From modelling to execution
-
Baresi, L., Chi, C.-H., Suzuki, J. (eds.). Springer, Heidelberg
-
Souza, A.R.R., Silva, B.L.B., Lins, F.A.A., Damasceno, J.C., Rosa, N.S., Maciel, P.R.M., Medeiros, R.W.A., Stephenson, B., Motahari-Nezhad, H.R., Li, J., Northfleet, C.: Incorporating Security Requirements into Service Composition: From Modelling to Execution. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOCServiceWave 2009. LNCS, vol. 5900, pp. 373-388. Springer, Heidelberg (2009)
-
(2009)
ICSOC Service Wave 2009. LNCS
, vol.5900
, pp. 373-388
-
-
Souza, A.R.R.1
Silva, B.L.B.2
Lins, F.A.A.3
Damasceno, J.C.4
Rosa, N.S.5
MacIel, P.R.M.6
Medeiros, R.W.A.7
Stephenson, B.8
Motahari-Nezhad, H.R.9
Li, J.10
Northfleet, C.11
-
15
-
-
46849122230
-
An access control system for web service compositions
-
IEEE Computer Society, Los Alamitos
-
Srivatsa, M., Iyengar, A., Mikalsen, T.A., Rouvellou, I., Yin, J.: An Access Control System for Web Service Compositions. In: International Conference on Web Services (ICWS), pp. 1-8. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
International Conference on Web Services (ICWS)
, pp. 1-8
-
-
Srivatsa, M.1
Iyengar, A.2
Mikalsen, T.A.3
Rouvellou, I.4
Yin, J.5
-
16
-
-
77954651006
-
On the combination of domain specific modeling languages
-
Kühne, T., Selic, B., Gervais, M.-P., Terrier, F. (eds.). Springer, Heidelberg
-
Vallecillo, A.: On the Combination of Domain Specific Modeling Languages. In: Kühne, T., Selic, B., Gervais, M.-P., Terrier, F. (eds.) ECMFA 2010. LNCS, vol. 6138, pp. 305-320. Springer, Heidelberg (2010)
-
(2010)
ECMFA 2010. LNCS
, vol.6138
, pp. 305-320
-
-
Vallecillo, A.1
-
17
-
-
38149139426
-
Deriving XACML policies from business process models
-
Weske, M., Hacid, M.-S., Godart, C. (eds.). Springer, Heidelberg
-
Wolter, C., Schaad, A., Meinel, C.: Deriving XACML Policies from Business Process Models. In:Weske, M., Hacid, M.-S., Godart, C. (eds.) WISEWorkshops 2007. LNCS, vol. 4832, pp. 142-153. Springer, Heidelberg (2007)
-
(2007)
WISE Workshops 2007. LNCS
, vol.4832
, pp. 142-153
-
-
Wolter, C.1
Schaad, A.2
Meinel, C.3
|