-
2
-
-
55049109759
-
Model-driven security engineering for trust management in SECTET
-
Alam M, Hafner M, and Breu R (2007). Model-driven security engineering for trust management in SECTET. Journal of Software, 2(1).
-
(2007)
Journal of Software
, vol.2
, Issue.1
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
5
-
-
24344438696
-
Secure software development by example
-
Apvrille A and Pourzandi M (2005). Secure software development by example. IEEE Security & Privacy, 3(4):10-17.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 10-17
-
-
Apvrille, A.1
Pourzandi, M.2
-
6
-
-
49049111838
-
Modelling security properties in a grid-based operating system with anti-goals
-
Arenas A, Aziz B, Bicarregui J, Matthews B, and Yang EY (2008). Modelling security properties in a grid-based operating system with anti-goals. In ARES [42]: 1429-1436.
-
(2008)
In ARES
, Issue.42
, pp. 1429-1436
-
-
Arenas, A.1
Aziz, B.2
Bicarregui, J.3
Matthews, B.4
Yang, E.Y.5
-
7
-
-
80052122622
-
A Metamodel-Based Approach for Analyzing Security-Design Models
-
Basin DA, Clavel M, Doser J, Egea M (2007). A Metamodel-Based Approach for Analyzing Security-Design Models. MoDELS 2007: 420-435.
-
(2007)
MoDELS
, vol.2007
, pp. 420-435
-
-
Basin, D.A.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
8
-
-
78650448009
-
Key Issues of a Formally Based Process Model for Security Engineering
-
Breu R, Burger K, Hafner M, Jürjens J, Popp G, Wimmel G, Lotz V (2003). Key Issues of a Formally Based Process Model for Security Engineering. In Sixteenth Intern. Conference on Software & Systems Engineering & their Applications (ICSSEA 2003).
-
(2003)
Sixteenth Intern. Conference On Software & Systems Engineering & their Applications (ICSSEA 2003)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
9
-
-
33845216895
-
A model based approach to trust, security and assurance
-
Baldwin A, Beres Y, Shiu S, and Kearney P (2006). A model based approach to trust, security and assurance. BT Technology Journal, 24(4):53-68.
-
(2006)
BT Technology Journal
, vol.24
, Issue.4
, pp. 53-68
-
-
Baldwin, A.1
Beres, Y.2
Shiu, S.3
Kearney, P.4
-
10
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin DA, Doser J, and Lodderstedt T (2006). Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1): 39-91.
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
11
-
-
57049172592
-
-
In Bart De Win, Seok-Won Lee, and Mattia Monga, editors, SESS, ACM
-
Bauer A and Jürjens J (2008). Security protocols, properties, and their monitoring. In Bart De Win, Seok-Won Lee, and Mattia Monga, editors, SESS: 33-40. ACM.
-
(2008)
Security Protocols, Properties, and Their Monitoring
, pp. 33-40
-
-
Bauer, A.1
Jürjens, J.2
-
14
-
-
33745264384
-
Modelling privilege management and access control
-
Blobel B, Nordberg R, Davis JM, and Pharow P (2006). Modelling privilege management and access control. International Journal of Medical Informatics, 75(8): 597-623.
-
(2006)
International Journal of Medical Informatics
, vol.75
, Issue.8
, pp. 597-623
-
-
Blobel, B.1
Nordberg, R.2
Davis, J.M.3
Pharow, P.4
-
15
-
-
33846828667
-
A model-driven approach for the german health telematics architectural framework and security infrastructure
-
Blobel B and Pharow P (2007). A model-driven approach for the german health telematics architectural framework and security infrastructure. International Journal of Medical Informatics, 76(2-3): 169-175.
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.2-3
, pp. 169-175
-
-
Blobel, B.1
Pharow, P.2
-
17
-
-
33750286091
-
A model transformation semantics and analysis methodology for SecureUML
-
of LNCS, Springer
-
Brucker AD, Doser J, and Wolff B (2006). A model transformation semantics and analysis methodology for SecureUML. In MoDELS 2006, volume 4199 of LNCS: 306-320. Springer.
-
(2006)
MoDELS 2006
, vol.4199
, pp. 306-320
-
-
Brucker, A.D.1
Doser, J.2
Wolff, B.3
-
18
-
-
26444451066
-
End-to-end integrated security and performance analysis on the DEGAS Choreographer Platform
-
of LNCS, Springer
-
Buchholtz M, Gilmore S, Haenel V, and Montangero C (2005). End-to-end integrated security and performance analysis on the DEGAS Choreographer Platform. In FM 2005, volume 3582 of LNCS: 286-301. Springer.
-
(2005)
FM 2005
, vol.3582
, pp. 286-301
-
-
Buchholtz, M.1
Gilmore, S.2
Haenel, V.3
Montangero, C.4
-
23
-
-
60949103111
-
Integrating model-based security risk management into ebusiness systems development: The CORAS approach
-
Kluwer
-
Dimitrakos T, Ritchie B, Raptis D, Aagedal JØ, den Braber F, Stølen K, and Houmb SH (2002). Integrating model-based security risk management into ebusiness systems development: The CORAS approach. In Second IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2002): 159-175. Kluwer.
-
(2002)
Second IFIP Conference On E-Commerce, E-Business, E-Government (I3E 2002)
, pp. 159-175
-
-
Dimitrakos, T.1
Ritchie, B.2
Raptis, D.3
Aagedal, J.Ø.4
den Braber, F.5
Stølen, K.6
Houmb, S.H.7
-
25
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
of LNCS, Springer
-
Elahi G and Yu E (2007). A goal oriented approach for modeling and analyzing security trade-offs. In ER 2007, volume 4801 of LNCS: 375-390. Springer.
-
(2007)
ER 2007
, vol.4801
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
27
-
-
84899175349
-
A methodology to develop secure systems using patterns
-
In H Mouratidis and P Giorgini, editors, chapter 5, IDEA Press
-
Fernandez EB, Larrondo-Petrie MM, Sorgente T, and Van Hilst M (2006). A methodology to develop secure systems using patterns. In H Mouratidis and P Giorgini, editors, Integrating security and software engineering: Advances and future vision, chapter 5: 107-126. IDEA Press.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 107-126
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
Sorgente, T.3
Van Hilst, M.4
-
28
-
-
35048814534
-
Extending OCL for secure database development
-
Springer
-
Fernández-Medina E and Piattini M (2004). Extending OCL for secure database development. In UML 2004, LNCS: 380-394. Springer.
-
(2004)
UML 2004, LNCS
, pp. 380-394
-
-
Fernández-Medina, E.1
Piattini, M.2
-
31
-
-
33646135775
-
Choreographing security and performance analysis for web services
-
of LNCS, Springer
-
Gilmore S, Haenel V, Kloul L, and Maidl M (2005). Choreographing security and performance analysis for web services. In EPEW/WS-FM 2005, volume 3670 of LNCS: 200-214. Springer.
-
(2005)
EPEW/WS-FM 2005
, vol.3670
, pp. 200-214
-
-
Gilmore, S.1
Haenel, V.2
Kloul, L.3
Maidl, M.4
-
32
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
In I.-Y. Song, S.W. Liddle, T.W. Ling, and P Scheuermann, editors, of LNCS, Springer
-
Giorgini P, Massacci F, and Mylopoulos J (2003). Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In I.-Y. Song, S.W. Liddle, T.W. Ling, and P Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), volume 2813 of LNCS: 263-276. Springer.
-
(2003)
22nd International Conference On Conceptual Modeling (ER 2003)
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
33
-
-
27644537252
-
-
In RE, IEEE Computer Society
-
Giorgini P, Massacci F, Mylopoulos J, and Zannone N (2005). Modeling security requirements through ownership, permission and delegation. In RE: 167-176. IEEE Computer Society.
-
(2005)
Modeling Security Requirements Through Ownership, Permission and Delegation
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
34
-
-
19144370194
-
On the verification of cryptographic protocols-a tale of two committees
-
In S Schneider and P Ryan, editors, of ENTCS. Elsevier
-
Gollmann D (2000). On the verification of cryptographic protocols-a tale of two committees. In S Schneider and P Ryan, editors, Workshop on Security Architectures and Information Flow, volume 32 of ENTCS. Elsevier.
-
(2000)
Workshop On Security Architectures and Information Flow
, vol.32
-
-
Gollmann, D.1
-
35
-
-
26944475725
-
Cryptographic protocol analysis on real c code
-
Springer
-
Goubault-Larrecq J and Parrennes F (2005). Cryptographic protocol analysis on real c code. In VMCAI'05, LNCS. Springer.
-
(2005)
VMCAI'05, LNCS
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
36
-
-
84882794820
-
Validation of cryptographic protocols by efficient automated testing
-
In James N. Etheredge and Bill Z. Manaris, editors, AAAI Press
-
Gürgens S and Peralta R (2000). Validation of cryptographic protocols by efficient automated testing. In James N. Etheredge and Bill Z. Manaris, editors, FLAIRS Conference: 7-12. AAAI Press.
-
(2000)
FLAIRS Conference
, pp. 7-12
-
-
Gürgens, S.1
Peralta, R.2
-
37
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley CB, Laney RC, Moffett JD, and Nuseibeh B (2008). Security requirements engineering: A framework for representation and analysis. IEEE Trans. Software Eng., 34(1):133-153.
-
(2008)
IEEE Trans. Software Eng
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
38
-
-
84944039689
-
A method for secure smartcard applications
-
In Hélène Kirchner and Christophe Ringeissen, editors, of Lecture Notes in Computer Science, Springer
-
Haneberg D, Reif W, and Stenzel K (2002). A method for secure smartcard applications. In Hélène Kirchner and Christophe Ringeissen, editors, AMAST, volume 2422 of Lecture Notes in Computer Science: 319-333. Springer.
-
(2002)
AMAST
, vol.2422
, pp. 319-333
-
-
Haneberg, D.1
Reif, W.2
Stenzel, K.3
-
39
-
-
0142157005
-
Bridging model-based and language-based security
-
In E Snekkenes and D Gollmann, editors, of LNCS, Springer
-
Heldal R and Hultin F (2003). Bridging model-based and language-based security. In E Snekkenes and D Gollmann, editors, 8th European Symposium on Research in Computer Security (ESORICS 2003), volume 2808 of LNCS: 235-252. Springer.
-
(2003)
8th European Symposium On Research In Computer Security (ESORICS 2003)
, vol.2808
, pp. 235-252
-
-
Heldal, R.1
Hultin, F.2
-
41
-
-
27144534308
-
-
In ICECCS, IEEE Computer Society
-
Houmb SH, Georg G, France RB, Bieman JM, and Jürjens J (2005). Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development. In ICECCS: 195-204. IEEE Computer Society.
-
(2005)
Cost-benefit Trade-off Analysis Using BBN For Aspect-oriented Risk-driven Development
, pp. 195-204
-
-
Houmb, S.H.1
Georg, G.2
France, R.B.3
Bieman, J.M.4
Jürjens, J.5
-
42
-
-
84882799865
-
-
IEEE. 3rd Int Conference on Availability, Reliability and Security (ARES 2008)
-
IEEE. 3rd Int Conference on Availability, Reliability and Security (ARES 2008), 2008.
-
(2008)
-
-
-
44
-
-
84885216103
-
Secure information flow for concurrent processes
-
In C Palamidessi, editor, of LNCS, Springer
-
Jürjens J (2000). Secure information flow for concurrent processes. In C Palamidessi, editor, CONCUR 2000 (11th International Conference on Concurrency Theory), volume 1877 of LNCS: 395-409. Springer.
-
(2000)
CONCUR 2000 (11th International Conference On Concurrency Theory)
, vol.1877
, pp. 395-409
-
-
Jürjens, J.1
-
46
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
In H Hußmann, editor, of LNCS, Springer. Also Oxford University Computing Laboratory TR-9-00 (November 2000)
-
Jürjens J (2001). Towards development of secure systems using UMLsec. In H Hußmann, editor, 4th International Conference on Fundamental Approaches to Software Engineering (FASE), volume 2029 of LNCS: 187-200. Springer. Also Oxford University Computing Laboratory TR-9-00 (November 2000), http://web.comlab.ox.ac.uk/oucl/publications/tr/tr-9-00.html.
-
(2001)
4th International Conference On Fundamental Approaches to Software Engineering (FASE)
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
51
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
Jürjens J (2005). Sound methods and effective tools for model-based security engineering with UML. In 27th Int Conf on Softw Engineering. IEEE.
-
(2005)
In 27th Int Conf On Softw Engineering. IEEE
-
-
Jürjens, J.1
-
52
-
-
34547455692
-
Security analysis of crypto-based Java programs using automated theorem provers
-
In S Easterbrook and S Uchitel, editors, ASE 2006). ACM
-
Jürjens J (2006). Security analysis of crypto-based Java programs using automated theorem provers. In S Easterbrook and S Uchitel, editors, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006). ACM.
-
(2006)
21st IEEE/ACM International Conference On Automated Software Engineering
-
-
Jürjens, J.1
-
54
-
-
55049118116
-
Model-based security analysis of the German Health Card architecture
-
Special section on Model-based Development of Trustworthy Health Information Systems
-
Jürjens J and Rumm R (2008). Model-based security analysis of the German Health Card architecture. Methods of Information in Medicine, vol. 47, 5: 409-416. Special section on Model-based Development of Trustworthy Health Information Systems.
-
(2008)
Methods of Information In Medicine
, vol.47
, Issue.5
, pp. 409-416
-
-
Jürjens, J.1
Rumm, R.2
-
55
-
-
35348959376
-
Tools for secure systems development with UML
-
Invited submission to the special issue for FASE 2004/05
-
Jürjens J and Shabalin P (2007). Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer, 9(5-6):527-544. Invited submission to the special issue for FASE 2004/05.
-
(2007)
Intern. Journal On Software Tools For Technology Transfer
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jürjens, J.1
Shabalin, P.2
-
56
-
-
84904204049
-
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
-
First IFIP Conference on E-Commerce, E-Business, and E-Government (I3E 2001)
-
Jürjens J, Wimmel G (2001). Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In Towards the E-Society: E-Commerce, E-Business, and E-Government. Intern. Federation for Information Processing (IFIP), Kluwer Academic Publishers: 489-506. First IFIP Conference on E-Commerce, E-Business, and E-Government (I3E 2001).
-
(2001)
Towards the E-Society: E-Commerce, E-Business, and E-Government. Intern. Federation For Information Processing (IFIP), Kluwer Academic Publishers
, pp. 489-506
-
-
Jürjens, J.1
Wimmel, G.2
-
57
-
-
34547453511
-
Code security analysis with assertions
-
In D.F. Redmiles, T Ellman, and A Zisman, editors, ACM
-
Jürjens J and Yampolskiy M(2005). Code security analysis with assertions. In D.F. Redmiles, T Ellman, and A Zisman, editors, 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005): 392-395. ACM.
-
(2005)
20th IEEE/ACM International Conference On Automated Software Engineering (ASE 2005)
, pp. 392-395
-
-
Jürjens, J.1
Yampolskiy, M.2
-
58
-
-
33947420435
-
A risk-driven security analysis method and modeling language
-
Kearney P and Brügger L (2007). A risk-driven security analysis method and modeling language. BT Technology Journal, 25(1).
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
-
-
Kearney, P.1
Brügger, L.2
-
59
-
-
37849187634
-
UML specification of access control policies and their formal verification
-
Koch M and Parisi-Presicce F (2006). UML specification of access control policies and their formal verification. Software and System Modeling, 5(4):429-447.
-
(2006)
Software and System Modeling
, vol.5
, Issue.4
, pp. 429-447
-
-
Koch, M.1
Parisi-Presicce, F.2
-
60
-
-
33746584791
-
SecTOOL-supporting requirements engineering for access control
-
In Günter Müller, editor, of Lecture Notes in Computer Science, Springer
-
Kolarczyk S, Koch M, Löhr K-P, and Pauls K (2006). SecTOOL-supporting requirements engineering for access control. In Günter Müller, editor, ETRICS, volume 3995 of Lecture Notes in Computer Science: 254-267. Springer.
-
(2006)
ETRICS
, vol.3995
, pp. 254-267
-
-
Kolarczyk, S.1
Koch, M.2
Löhr, K.-P.3
Pauls, K.4
-
61
-
-
0031335394
-
Threat scenarios as a means to formally develop secure systems
-
Lotz V (1997). Threat scenarios as a means to formally develop secure systems. Journal of Computer Security, 5(1):31-68.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.1
, pp. 31-68
-
-
Lotz, V.1
-
62
-
-
33750048791
-
A business process-driven approach to security engineering
-
IEEE Computer Society
-
Maña A, Montenegro JA, Rudolph C, and Vivas JL (2003). A business process-driven approach to security engineering. In DEXA Workshops: 477-481. IEEE Computer Society.
-
(2003)
DEXA Workshops
, pp. 477-481
-
-
Maña, A.1
Montenegro, J.A.2
Rudolph, C.3
Vivas, J.L.4
-
63
-
-
37249038828
-
Security engineering for Ambient Intelligence: A manifesto
-
In H Mouratidis, editor, Idea Group
-
Maña A, Rudolph C, Spanoudakis G, Lotz V, Massacci F, Melideo M, and López-Cobo J-M (2006). Security engineering for Ambient Intelligence: A manifesto. In H Mouratidis, editor, Integrating Security and Software Engineering: Advances and Future Vision. Idea Group.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
-
-
Maña, A.1
Rudolph, C.2
Spanoudakis, G.3
Lotz, V.4
Massacci, F.5
Melideo, M.6
López-Cobo, J.-M.7
-
65
-
-
84882764062
-
-
In Sztipanovits et al. [83]
-
Mathe J, Duncavage S, Werner J, Malin B, Ledeczi A, and Sztipanovits J (2007). Implementing a model-based design environment for clinical information systems. In Sztipanovits et al. [83].
-
(2007)
Implementing a Model-based Design Environment For Clinical Information Systems
-
-
Mathe, J.1
Duncavage, S.2
Werner, J.3
Malin, B.4
Ledeczi, A.5
Sztipanovits, J.6
-
67
-
-
35348953633
-
Specification and refinement of access control
-
Méry D and Merz S (2007). Specification and refinement of access control. J. UCS, 13(8):1073-1093.
-
(2007)
J. UCS
, vol.13
, Issue.8
, pp. 1073-1093
-
-
Méry, D.1
Merz, S.2
-
69
-
-
35048845022
-
Integrating security and systems engineering: Towards the modelling of secure information systems
-
In J Eder andMMissikoff, editors, of LNCS, Springer
-
Mouratidis H, Giorgini P, and Manson GA (2003). Integrating security and systems engineering: Towards the modelling of secure information systems. In J Eder andMMissikoff, editors, 15th International Conference on Advanced Information Systems Engineering (CAiSE 2003), volume 2681 of LNCS: 63-78. Springer.
-
(2003)
15th International Conference On Advanced Information Systems Engineering (CAiSE 2003)
, vol.2681
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
71
-
-
49049110544
-
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models
-
Pironti A, Sisto R (2008). Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. In ARES 2008: 72-79.
-
(2008)
ARES 2008
, pp. 72-79
-
-
Pironti, A.1
Sisto, R.2
-
72
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
Ray I, France RB, Li N, and Georg G (2004). An aspect-based approach to modeling access control concerns. Information & Software Technology, 46(9):575-587.
-
(2004)
Information & Software Technology
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.B.2
Li, N.3
Georg, G.4
-
75
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J and Schroeder M (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
76
-
-
33751016038
-
Stepwise development of secure systems
-
In Janusz Górski, editor, of Lecture Notes in Computer Science, Springer
-
Santen T (2006). Stepwise development of secure systems. In Janusz Górski, editor, SAFECOMP, volume 4166 of Lecture Notes in Computer Science: 142-155. Springer.
-
(2006)
SAFECOMP
, vol.4166
, pp. 142-155
-
-
Santen, T.1
-
77
-
-
84957012794
-
Confidentiality-preserving refinement is compositional-sometimes
-
In Dieter Gollmann, Günter Karjoth, and Michael Waidner, editors, of Lecture Notes in Computer Science, Springer
-
Santen T, Heisel M, and Pfitzmann A (2002). Confidentiality-preserving refinement is compositional-sometimes. In Dieter Gollmann, Günter Karjoth, and Michael Waidner, editors, ESORICS, volume 2502 of Lecture Notes in Computer Science: 194-211. Springer.
-
(2002)
ESORICS
, vol.2502
, pp. 194-211
-
-
Santen, T.1
Heisel, M.2
Pfitzmann, A.3
-
78
-
-
0003714340
-
-
editor, National Academy Press, Washington, DC. Available at
-
Schneider F, editor (1999). Trust in Cyberspace. National Academy Press, Washington, DC. Available at http://www.nap.edu/readingroom/books/trust.
-
(1999)
Trust In Cyberspace
-
-
Schneider, F.1
-
80
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G and Opdahl AL (2005). Eliciting security requirements with misuse cases. Requir. Eng., 10(1):34-44.
-
(2005)
Requir. Eng
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
83
-
-
84882759893
-
-
editors, Workshop on Model-based Trustworthy Health Information Systems (MOTHIS@Models)
-
Sztipanovits J, Breu R, Ammenwerth E, Bajcsy R, Mitchell JC, and Pretschner A, editors (2007). Workshop on Model-based Trustworthy Health Information Systems (MOTHIS@Models).
-
(2007)
-
-
Sztipanovits, J.1
Breu, R.2
Ammenwerth, E.3
Bajcsy, R.4
Mitchell, J.C.5
Pretschner, A.6
-
84
-
-
84882754522
-
-
UMLsec group. Security analysis tool
-
UMLsec group. Security analysis tool, 2004. http://www.umlsec.org.
-
(2004)
-
-
-
85
-
-
57349132966
-
Executable misuse cases for modeling security concerns
-
Whittle J, Wijesekera D, and Hartong M (2008). Executable misuse cases for modeling security concerns. In ICSE 2008.
-
(2008)
ICSE
-
-
Whittle, J.1
Wijesekera, D.2
Hartong, M.3
-
86
-
-
84882804583
-
-
Knowledge Transfer Network on Cyber Security, UK. Available at
-
Whyte B and Harrison J (2008). Secure software development-a white paper. Knowledge Transfer Network on Cyber Security, UK. Available at http://www.ktn.qinetiqtim.net/content/files/groups/securesoft/SSDSIGsoftwareSecurityFailures.pdf.
-
(2008)
Secure Software Development-a White Paper
-
-
Whyte, B.1
Harrison, J.2
-
87
-
-
84948967933
-
Specification-based test generation for security-critical systems using mutations
-
of LNCS, Springer
-
Wimmel G and Jürjens J (2002). Specification-based test generation for security-critical systems using mutations. In International Conference on Formal Engineering Methods (ICFEM), volume 2495 of LNCS: 471-482. Springer.
-
(2002)
International Conference On Formal Engineering Methods (ICFEM)
, vol.2495
, pp. 471-482
-
-
Wimmel, G.1
Jürjens, J.2
-
89
-
-
55249114157
-
Performance analysis of security aspects by weaving scenarios from UML models
-
Woodside M, Petriu DC, Petriu DB, Xu J, Israr T, Georg G, France R, Bieman JM, Houmb SH, and Jürjens J (2008). Performance analysis of security aspects by weaving scenarios from UML models. Journal of Systems and Software, vol. 82, 1: 56-74.
-
(2008)
Journal of Systems and Software
, vol.82
, Issue.1
, pp. 56-74
-
-
Woodside, M.1
Petriu, D.C.2
Petriu, D.B.3
Xu, J.4
Israr, T.5
Georg, G.6
France, R.7
Bieman, J.M.8
Houmb, S.H.9
Jürjens, J.10
-
90
-
-
17744383167
-
Security patterns: A method for constructing secure and efficient inter-company coordination systems
-
Yoshioka N, Honiden S, and Finkelstein A (2004). Security patterns: A method for constructing secure and efficient inter-company coordination systems. In EDOC: 84-97.
-
(2004)
In EDOC
, pp. 84-97
-
-
Yoshioka, N.1
Honiden, S.2
Finkelstein, A.3
|