메뉴 건너뛰기




Volumn , Issue , 2012, Pages 177-184

Supporting security assurance in the context of evolution: Modular modeling and analysis with UMLsec

Author keywords

Modular Analysis Model; Secure Information Flow; UMLsec

Indexed keywords

ANALYSIS MODELS; DESIGN MODELS; MODEL BASED DEVELOPMENT; MODEL CHANGE; MODULAR ANALYSIS; MODULAR APPROACH; MODULAR MODELING; SECURE INFORMATION FLOW; SECURITY ASSURANCE; SECURITY REQUIREMENTS; SYSTEM EVOLUTION; UMLSEC;

EID: 84871955734     PISSN: 15302059     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HASE.2012.35     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 1
    • 0031648261 scopus 로고    scopus 로고
    • Software's future: Managing evolution
    • M. Lehman, "Software's future: Managing evolution," IEEE Software, vol. 15, no. 1, pp. 40-44, 1998.
    • (1998) IEEE Software , vol.15 , Issue.1 , pp. 40-44
    • Lehman, M.1
  • 5
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • J. Jürjens, "Sound methods and effective tools for model-based security engineering with UML," in ICSE, 2005.
    • (2005) ICSE
    • Jürjens, J.1
  • 6
    • 84871965078 scopus 로고    scopus 로고
    • "UMLsecTool," 2001-2011, http://jan.jurjens.de/umlsectool.
    • (2001) UMLsecTool
  • 7
    • 57349126199 scopus 로고    scopus 로고
    • Model-based security analysis for mobile communications
    • ACM
    • J. Jürjens, J. Schreck, and P. Bartmann, "Model-based security analysis for mobile communications," in ICSE. ACM, 2008.
    • (2008) ICSE
    • Jürjens, J.1    Schreck, J.2    Bartmann, P.3
  • 8
    • 84871988588 scopus 로고    scopus 로고
    • Accessed July 2011
    • "CARiSMA," http://vm4a003.itmc.tudortmund.de/carisma/web/doku. php (Accessed July 2011).
    • CARiSMA
  • 9
    • 0033701251 scopus 로고    scopus 로고
    • Possibilistic definitions of security - An assembly kit
    • Cambridge, UK: IEEE Computer Society, July 3-5
    • H. Mantel, "Possibilistic definitions of security - an assembly kit," in Proceedings of the IEEE Computer Security Foundations Workshop. Cambridge, UK: IEEE Computer Society, July 3-5 2000, pp. 185-199.
    • (2000) Proceedings of the IEEE Computer Security Foundations Workshop , pp. 185-199
    • Mantel, H.1
  • 10
    • 33846272388 scopus 로고    scopus 로고
    • Looking Back at the Bell-La Padula Model
    • Proceedings of the 21st Annual Computer Security Applications Conference, ser. Washington, DC, USA: IEEE Computer Society
    • D. E. Bell, "Looking Back at the Bell-La Padula Model," in Proceedings of the 21st Annual Computer Security Applications Conference, ser. ACSAC '05. Washington, DC, USA: IEEE Computer Society, 2005, pp. 337-351.
    • (2005) ACSAC '05 , pp. 337-351
    • Bell, D.E.1
  • 11
    • 56449131232 scopus 로고    scopus 로고
    • 15 Years of triple graph grammars
    • Graph Transformations, ser. H. Ehrig, R. Heckel, G. Rozenberg, and G. Taentzer, Eds. Springer Berlin / Heidelberg
    • A. Schürr and F. Klar, "15 years of triple graph grammars," in Graph Transformations, ser. LNCS, H. Ehrig, R. Heckel, G. Rozenberg, and G. Taentzer, Eds. Springer Berlin / Heidelberg, 2008, vol. 5214, pp. 411-425.
    • (2008) LNCS , vol.5214 , pp. 411-425
    • Schürr, A.1    Klar, F.2
  • 13
    • 40149100019 scopus 로고    scopus 로고
    • Integrating a formal method into a software engineering process with UML and Java
    • March
    • M. Möller, E. Olderog, H. Rasch, and H. Wehrheim, "Integrating a formal method into a software engineering process with UML and Java," Formal Aspects of Computing, vol. 20, no. 2, pp. 161-204, March 2008.
    • (2008) Formal Aspects of Computing , vol.20 , Issue.2 , pp. 161-204
    • Möller, M.1    Olderog, E.2    Rasch, H.3    Wehrheim, H.4
  • 15
    • 0031335655 scopus 로고    scopus 로고
    • Metrics and Laws of Software Evolution - The Nineties View
    • Washington, DC, USA: IEEE Computer Society
    • M. M. Lehman, J. F. Ramil, P. D. Wernick, D. E. Perry, and W. M. Turski, "Metrics and Laws of Software Evolution - The Nineties View," in METRICS'97. Washington, DC, USA: IEEE Computer Society, 1997, pp. 20-32.
    • (1997) METRICS'97 , pp. 20-32
    • Lehman, M.M.1    Ramil, J.F.2    Wernick, P.D.3    Perry, D.E.4    Turski, W.M.5
  • 17
    • 0033901139 scopus 로고    scopus 로고
    • Automating support for software evolution in UML
    • February
    • T. Mens and T. D'Hondt, "Automating support for software evolution in UML," Automated Software Engineering Journal, vol. 7, no. 1, pp. 39-59, February 2000.
    • (2000) Automated Software Engineering Journal , vol.7 , Issue.1 , pp. 39-59
    • Mens, T.1    D'Hondt, T.2
  • 18
    • 33745167684 scopus 로고    scopus 로고
    • When and how to develop domain-specific languages
    • Dec.
    • M. Mernik, J. Heering, and A. M. Sloane, "When and how to develop domain-specific languages," ACM Comput. Surv., vol. 37, no. 4, pp. 316-344, Dec. 2005.
    • (2005) ACM Comput. Surv. , vol.37 , Issue.4 , pp. 316-344
    • Mernik, M.1    Heering, J.2    Sloane, A.M.3
  • 19
    • 23944450600 scopus 로고    scopus 로고
    • Experiences in modeling for a domain specific language
    • UML Modeling Languages and Applications, ser. N. Jardim Nunes, B. Selic, A. Rodrigues da Silva, and A. Toval Alvarez, Eds. Springer Berlin / Heidelberg
    • S. Anonsen, "Experiences in modeling for a domain specific language," in UML Modeling Languages and Applications, ser. LNCS, N. Jardim Nunes, B. Selic, A. Rodrigues da Silva, and A. Toval Alvarez, Eds. Springer Berlin / Heidelberg, 2005, vol. 3297, pp. 187-197.
    • (2005) LNCS , vol.3297 , pp. 187-197
    • Anonsen, S.1
  • 20
    • 79551516193 scopus 로고    scopus 로고
    • Lightweight modeling and analysis of security concepts
    • Engineering Secure Software and Systems, ser. U. Erlingsson, R. Wieringa, and N. Zannone, Eds. Springer Berlin / Heidelberg
    • J. Eichler, "Lightweight modeling and analysis of security concepts," in Engineering Secure Software and Systems, ser. LNCS, U. Erlingsson, R. Wieringa, and N. Zannone, Eds. Springer Berlin / Heidelberg, 2011, vol. 6542, pp. 128-141.
    • (2011) LNCS , vol.6542 , pp. 128-141
    • Eichler, J.1
  • 21
    • 47749124620 scopus 로고    scopus 로고
    • 11th International Workshop on Aspect-Oriented Modeling
    • Models in Software Engineering, ser. H. Giese, Ed. Springer Berlin / Heidelberg
    • J. Kienzle, J. Gray, D. Stein, W. Cazzola, O. Aldawud, and T. Elrad, "11th International Workshop on Aspect-Oriented Modeling," in Models in Software Engineering, ser. LNCS, H. Giese, Ed. Springer Berlin / Heidelberg, 2008, vol. 5002, pp. 1-6.
    • (2008) LNCS , vol.5002 , pp. 1-6
    • Kienzle, J.1    Gray, J.2    Stein, D.3    Cazzola, W.4    Aldawud, O.5    Elrad, T.6
  • 22
    • 71549123688 scopus 로고    scopus 로고
    • Dynamic weaving of aspect-oriented executable UML models
    • Transactions on Aspect- Oriented Software Development VI, ser. S. Katz, H. Ossher, R. France, and J.-M. Jézéquel, Eds. Springer Berlin / Heidelberg
    • L. Fuentes and P. Sánchez, "Dynamic weaving of aspect-oriented executable UML models," in Transactions on Aspect- Oriented Software Development VI, ser. LNCS, S. Katz, H. Ossher, R. France, and J.-M. Jézéquel, Eds. Springer Berlin / Heidelberg, 2009, vol. 5560, pp. 1-38.
    • (2009) LNCS , vol.5560 , pp. 1-38
    • Fuentes, L.1    Sánchez, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.