-
1
-
-
0030126124
-
Distributing trust with the Rampart toolkit
-
Reiter, M. (1996) Distributing trust with the Rampart toolkit, Communications of the ACM, v.39 n.4, p.71-74.
-
(1996)
Communications of the ACM
, vol.39
, Issue.4
, pp. 71-74
-
-
Reiter, M.1
-
2
-
-
84882756795
-
-
BEA White Paper BEA WebLogic Security Framework Working with Your Security Eco-System, Cited 6 July
-
BEA White Paper BEA WebLogic Security Framework Working with Your Security Eco-System. http://www.bea.com. Cited 6 July 2008.
-
(2008)
-
-
-
4
-
-
3042595025
-
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment
-
Llewellyn-Jones, D., Merabti, M., Shi, Q., B. Askwith (2004) An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. In Proceedings of International Conference on Information Technology.
-
(2004)
Proceedings of International Conference On Information Technology
-
-
Llewellyn-Jones, D.1
Merabti, M.2
Shi, Q.3
Askwith, B.4
-
7
-
-
0034422338
-
The Gaia methodology for agent-oriented analysis and design
-
Wooldridge, M., Jennings, N.R., Kinny D. (2000) The Gaia methodology for agent-oriented analysis and design. Journal of Autonomous Agents and Multi-Agent Systems, 3(3), p.285.
-
(2000)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.3
, Issue.3
, pp. 285
-
-
Wooldridge, M.1
Jennings, N.R.2
Kinny, D.3
-
10
-
-
84882773972
-
-
Cigital Labs AOP An Aspect-Oriented Security Assurance Solution, Cited 6 July
-
Cigital Labs AOP An Aspect-Oriented Security Assurance Solution. http://www.cigital.com/labs/projects/1027/. Cited 6 July 2008
-
(2008)
-
-
-
12
-
-
78650494504
-
Utilizing Component Composition for Secure ubiquitous Computing
-
Llewellyn-Jones, D., Merabti, M., Shi, Q., Askwith, B. (2004) Utilizing Component Composition for Secure ubiquitous Computing. In Proceedings of 2nd UK-UbiNet Workshop.
-
(2004)
Proceedings of 2nd UK-UbiNet Workshop
-
-
Llewellyn-Jones, D.1
Merabti, M.2
Shi, Q.3
Askwith, B.4
-
13
-
-
0032202421
-
An effective model for composition of secure systems
-
Shi, Q., Zhang, N. (1998) An effective model for composition of secure systems. Journal of Systems and Software. 43(3), pp. 233-244.
-
(1998)
Journal of Systems and Software
, vol.43
, Issue.3
, pp. 233-244
-
-
Shi, Q.1
Zhang, N.2
-
15
-
-
0037343253
-
Adding Roles to CORBA Objects
-
Canal, C., Fuentes, L., Pimentel, E., Troya, J.M., Vallecillo, A. (2003) Adding Roles to CORBA Objects. IEEE Transactions on Software Engineering 29(3), pp. 242-260.
-
(2003)
IEEE Transactions On Software Engineering
, vol.29
, Issue.3
, pp. 242-260
-
-
Canal, C.1
Fuentes, L.2
Pimentel, E.3
Troya, J.M.4
Vallecillo, A.5
-
16
-
-
17144455408
-
Integrating PMI Services in CORBA Applications
-
Elsevier
-
López, J., Maña, A., Ortega, J.J., Troya, J., Yague, M.I. (2003) Integrating PMI Services in CORBA Applications. In Computer Standards & Interfaces, 25, 4, pp. 391-409. Elsevier.
-
(2003)
Computer Standards & Interfaces
, vol.25
, Issue.4
, pp. 391-409
-
-
López, J.1
Maña, A.2
Ortega, J.J.3
Troya, J.4
Yague, M.I.5
-
19
-
-
0036143326
-
Composing Security-aware Software
-
IEEE
-
Khan, K., Han, J. (2002) Composing Security-aware Software. IEEE Software, Vol. 19, Issue 1, pp 34-41. IEEE.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 34-41
-
-
Khan, K.1
Han, J.2
-
20
-
-
84882807265
-
Dynamic Contextual Adaptation
-
Elsevier
-
Brogi, A., Cmara, J., Canal, C., Cubo, J., Pimentel, E. (2006) Dynamic Contextual Adaptation. Workshop on the Foundations of Coordination Languages and Software Architectures. Electronic Notes in Theoretical Computer Science. Elsevier.
-
(2006)
Workshop on the Foundations of Coordination Languages and Software Architectures. Electronic Notes In Theoretical Computer Science
-
-
Brogi, A.1
Cmara, J.2
Canal, C.3
Cubo, J.4
Pimentel, E.5
-
25
-
-
35048850964
-
-
IBM's Security Strategy team, An IBM White Paper, Cited 6 July
-
IBM's Security Strategy team (2004) Introduction to Business Security Patterns. An IBM White Paper. http//www-3.ibm.com/security/patterns/intro.pdf. Cited 6 July 2008.
-
(2004)
Introduction to Business Security Patterns
-
-
-
26
-
-
33645586196
-
Using Security Patterns to Model and Analyze Security Requirements
-
Konrad, S., Cheng, B.H.C., Campbell Laura, A., Wassermann, R. (2003) Using Security Patterns to Model and Analyze Security Requirements. In Proc. Requirements for High Assurance Systems Workshop.
-
(2003)
Proc. Requirements For High Assurance Systems Workshop
-
-
Konrad, S.1
Cheng, B.H.C.2
Campbell Laura, A.3
Wassermann, R.4
-
27
-
-
12744277616
-
Architectural Patterns for Enabling Application Security
-
Addison Wesley
-
Yoder, J., Barcalow, J. (2000) Architectural Patterns for Enabling Application Security. In Pattern Languages of Program Design, pp. 301-336. Addison Wesley.
-
(2000)
Pattern Languages of Program Design
, pp. 301-336
-
-
Yoder, J.1
Barcalow, J.2
-
29
-
-
0003880013
-
-
Addison-Wesley
-
Gamma, E., Helm, R., Johnson, R., and Vlissides, J. (1994) Design patterns Elements of Reusable Object-Oriented Software. Addison-Wesley.
-
(1994)
Design Patterns Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
34
-
-
0031597155
-
Formalizing design patterns
-
IEEE Computer Society Press
-
Mikkonen, T. (1998) Formalizing design patterns. In Proc. of 20th ICSE, pp. 115-124. IEEE Computer Society Press.
-
(1998)
Proc. of 20th ICSE
, pp. 115-124
-
-
Mikkonen, T.1
-
35
-
-
84882796204
-
-
Security Patterns. Technical Report MSU-CSE-03-23, Computer Science and Engineering
-
Wassermann, R., Cheng, B.H.C. (2003) Security Patterns. Technical Report MSU-CSE-03-23, Computer Science and Engineering.
-
(2003)
-
-
Wassermann, R.1
Cheng, B.H.C.2
-
36
-
-
47849123445
-
Monitoring Design Pattern Contracts
-
Hallstrom, J. O., Soundarajan, N., Tyler, B. (2004) Monitoring Design Pattern Contracts. In Proc. of the FSE-12 Workshop on Specification and Verification of Component-Based Systems, pp. 87-94.
-
(2004)
In Proc. of the FSE-12 Workshop On Specification and Verification of Component-Based Systems
, pp. 87-94
-
-
Hallstrom, J.O.1
Soundarajan, N.2
Tyler, B.3
-
41
-
-
84892902868
-
A pattern system for access control
-
Torsten, P, Fernandez, E.B., Mehlau, J.I., Pernul, G. (2004) A pattern system for access control. 18th IFIP WG 11.3 Conference on Data and Applications Security.
-
(2004)
18th IFIP WG 11.3 Conference On Data and Applications Security
-
-
Torsten, P.1
Fernandez, E.B.2
Mehlau, J.I.3
Pernul, G.4
-
42
-
-
84882805189
-
-
available from
-
Androutsopoulos K, Ballas C, Kloukinas C, Mahbub K, Spanoudakis G (2007) Version 1 of the dynamic validation prototype. Deliverable A4.D3.1, SERENITY EU Research Project 027587, available from http//www.serenity-forum.org/Work-package-4-3.html
-
(2007)
Version 1 of the Dynamic Validation Prototype. Deliverable A4.D3.1, SERENITY EU Research Project 027587
-
-
Androutsopoulos, K.1
Ballas, C.2
Kloukinas, C.3
Mahbub, K.4
Spanoudakis, G.5
-
43
-
-
1642497296
-
The event calculus explained
-
In Wooldridge MJ, Veloso M (eds)
-
Shanahan MP (1999) The event calculus explained. In Wooldridge MJ, Veloso M (eds) Artificial Intelligence Today, vol 1600, pp 409-430.
-
(1999)
Artificial Intelligence Today
, vol.1600
, pp. 409-430
-
-
Shanahan, M.P.1
-
45
-
-
84882745169
-
-
Information Security Series
-
Tsigkritis T, Spanoudakis G, Kloukinas C, Lorenzoli D (2009) Security and Dependability for Ambient Intelligence, Springer Verlag, chap Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework. Information Security Series.
-
(2009)
Security and Dependability For Ambient Intelligence, Springer Verlag, Chap Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
-
-
Tsigkritis, T.1
Spanoudakis, G.2
Kloukinas, C.3
Lorenzoli, D.4
-
46
-
-
53049084036
-
Preservation of Proof Obligations from Java to the Java Virtual Machine
-
Barthe G, Grgoire B, Pavlova M. (2008) Preservation of Proof Obligations from Java to the Java Virtual Machine. IJCAR 2008. 83-99.
-
(2008)
IJCAR
, vol.2008
, pp. 83-99
-
-
Barthe, G.1
Grgoire, B.2
Pavlova, M.3
|