메뉴 건너뛰기




Volumn 45, Issue , 2009, Pages 69-95

Representation of Security and Dependability Solutions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84874775506     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-88775-3_5     Document Type: Article
Times cited : (10)

References (46)
  • 1
    • 0030126124 scopus 로고    scopus 로고
    • Distributing trust with the Rampart toolkit
    • Reiter, M. (1996) Distributing trust with the Rampart toolkit, Communications of the ACM, v.39 n.4, p.71-74.
    • (1996) Communications of the ACM , vol.39 , Issue.4 , pp. 71-74
    • Reiter, M.1
  • 2
    • 84882756795 scopus 로고    scopus 로고
    • BEA White Paper BEA WebLogic Security Framework Working with Your Security Eco-System, Cited 6 July
    • BEA White Paper BEA WebLogic Security Framework Working with Your Security Eco-System. http://www.bea.com. Cited 6 July 2008.
    • (2008)
  • 10
    • 84882773972 scopus 로고    scopus 로고
    • Cigital Labs AOP An Aspect-Oriented Security Assurance Solution, Cited 6 July
    • Cigital Labs AOP An Aspect-Oriented Security Assurance Solution. http://www.cigital.com/labs/projects/1027/. Cited 6 July 2008
    • (2008)
  • 13
    • 0032202421 scopus 로고    scopus 로고
    • An effective model for composition of secure systems
    • Shi, Q., Zhang, N. (1998) An effective model for composition of secure systems. Journal of Systems and Software. 43(3), pp. 233-244.
    • (1998) Journal of Systems and Software , vol.43 , Issue.3 , pp. 233-244
    • Shi, Q.1    Zhang, N.2
  • 19
    • 0036143326 scopus 로고    scopus 로고
    • Composing Security-aware Software
    • IEEE
    • Khan, K., Han, J. (2002) Composing Security-aware Software. IEEE Software, Vol. 19, Issue 1, pp 34-41. IEEE.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 34-41
    • Khan, K.1    Han, J.2
  • 25
    • 35048850964 scopus 로고    scopus 로고
    • IBM's Security Strategy team, An IBM White Paper, Cited 6 July
    • IBM's Security Strategy team (2004) Introduction to Business Security Patterns. An IBM White Paper. http//www-3.ibm.com/security/patterns/intro.pdf. Cited 6 July 2008.
    • (2004) Introduction to Business Security Patterns
  • 27
    • 12744277616 scopus 로고    scopus 로고
    • Architectural Patterns for Enabling Application Security
    • Addison Wesley
    • Yoder, J., Barcalow, J. (2000) Architectural Patterns for Enabling Application Security. In Pattern Languages of Program Design, pp. 301-336. Addison Wesley.
    • (2000) Pattern Languages of Program Design , pp. 301-336
    • Yoder, J.1    Barcalow, J.2
  • 34
    • 0031597155 scopus 로고    scopus 로고
    • Formalizing design patterns
    • IEEE Computer Society Press
    • Mikkonen, T. (1998) Formalizing design patterns. In Proc. of 20th ICSE, pp. 115-124. IEEE Computer Society Press.
    • (1998) Proc. of 20th ICSE , pp. 115-124
    • Mikkonen, T.1
  • 35
    • 84882796204 scopus 로고    scopus 로고
    • Security Patterns. Technical Report MSU-CSE-03-23, Computer Science and Engineering
    • Wassermann, R., Cheng, B.H.C. (2003) Security Patterns. Technical Report MSU-CSE-03-23, Computer Science and Engineering.
    • (2003)
    • Wassermann, R.1    Cheng, B.H.C.2
  • 43
    • 1642497296 scopus 로고    scopus 로고
    • The event calculus explained
    • In Wooldridge MJ, Veloso M (eds)
    • Shanahan MP (1999) The event calculus explained. In Wooldridge MJ, Veloso M (eds) Artificial Intelligence Today, vol 1600, pp 409-430.
    • (1999) Artificial Intelligence Today , vol.1600 , pp. 409-430
    • Shanahan, M.P.1
  • 46
    • 53049084036 scopus 로고    scopus 로고
    • Preservation of Proof Obligations from Java to the Java Virtual Machine
    • Barthe G, Grgoire B, Pavlova M. (2008) Preservation of Proof Obligations from Java to the Java Virtual Machine. IJCAR 2008. 83-99.
    • (2008) IJCAR , vol.2008 , pp. 83-99
    • Barthe, G.1    Grgoire, B.2    Pavlova, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.