-
1
-
-
33745471209
-
Model driven security: From uml models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T. : Model Driven Security: From UML Models to Access Control Infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006)
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
2
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J., Pavlovic, D. : A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423-482 (2005)
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Pavlovic, D.4
-
3
-
-
33750441515
-
Security patterns and requirements for internet-based applications
-
David, R., Carlos, G., Fernandez-Medina, E., Piattini,M. : Security patterns and requirements for internet-based applications. Internet Research 16(5), 519-536 (2006)
-
(2006)
Internet Research
, vol.16
, Issue.5
, pp. 519-536
-
-
David, R.1
Carlos, G.2
Fernandez-Medina, E.3
Piattini, M.4
-
4
-
-
49049090200
-
A pattern-driven security process for soa applications
-
IEEE Computer Society, Washington, DC
-
Delessy, N., Fernandez, E. B. : A Pattern-Driven Security Process for SOA Applications. In: ARES 2008: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, pp. 416-421. IEEE Computer Society, Washington, DC (2008)
-
(2008)
ARES 2008: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
, pp. 416-416
-
-
Delessy, N.1
Fernandez, E.B.2
-
6
-
-
84883276848
-
SEctet a domain architecture for model driven security
-
November 2006
-
Hafner, M. : SECTET A Domain Architecture for Model Driven Security. PhD Thesis (November 2006)
-
PhD Thesis
-
-
Hafner, M.1
-
8
-
-
73149108190
-
Seaas - A reference architecture for security services in soa
-
Hafner, M., Memon, M., Breu, R. : SeAAS-A Reference Architecture for Security Services in SOA. Journal of Universal Computer Science 15(15), 2916-2936 (2009), http://www. jucs. org/jucs-15-15/seaas-a-reference- architecture
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.15
, pp. 2916-2936
-
-
Hafner, M.1
Memon, M.2
Breu, R.3
-
12
-
-
34247151648
-
A bpmn extension for the modeling of security requirements in business processes
-
Rodriguez, A., Fernandez-Medina, E., Piattini, M. : A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE-Transactions on Information and Systems E90-D(4), 745-752 (2007)
-
(2007)
IEICE-Transactions on Information and Systems E90-D(4
, pp. 745-752
-
-
Rodriguez, A.1
Fernandez-Medina, E.2
Piattini, M.3
-
13
-
-
70249097010
-
Comparison of security patterns
-
Rosado, D. G., Fernandez-Medina, E., Piattini,M. : Comparison of Security Patterns. IJCSNS-International Journal of Computer Science and Network Security 6(2B), 139-146 (2006)
-
(2006)
IJCSNS-International Journal of Computer Science and Network Security
, vol.6
, Issue.2 B
, pp. 139-146
-
-
Rosado, D.G.1
Fernandez-Medina, E.2
Piattini, M.3
-
14
-
-
38949105485
-
Adding authentication to model driven security
-
IEEE Computer Society, Washington, DC
-
Satoh, F., Nakamura, Y., Ono, K. : Adding Authentication to Model Driven Security. In: ICWS 2006: Proceedings of the IEEE International Conference on Web Services, pp. 585-594. IEEE Computer Society, Washington, DC (2006)
-
(2006)
ICWS 2006: Proceedings of the IEEE International Conference on Web Services
, pp. 585-594
-
-
Satoh, F.1
Nakamura, Y.2
Ono, K.3
-
15
-
-
33646188481
-
-
Springer-Verlag New York, Inc., Secaucus
-
Schumacher, M. : Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag New York, Inc., Secaucus (2003)
-
(2003)
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
-
-
Schumacher, M.1
-
16
-
-
79955143136
-
Secureuml: A uml-based modeling language for model-driven security
-
Jézéquel J.-M., Hussmann, H., Cook, S. (Eds.). Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J. : SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
17
-
-
84883274584
-
Extended description techniques for security engineering
-
In: Dupuy, M., Paradinas, P. (eds. Springer, Boston
-
Wimmel, G., Wisspeintner, A. : Extended Description Techniques for Security Engineering. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information. IFIP, vol. 65, pp. 469-485. Springer, Boston (2002)
-
(2002)
Trusted Information. IFIP
, vol.65
, pp. 469-485
-
-
Wimmel, G.1
Wisspeintner, A.2
-
18
-
-
63949084590
-
Model-driven business process security requirement specification
-
Wolter, C., Menzel, M., Christoph, M., et al. : Model-driven business process security requirement specification. J. Syst. Archit. 55(4), 211-223 (2009)
-
(2009)
J. Syst. Archit.
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Christoph, M.3
-
19
-
-
84859973861
-
-
In: Modellierung
-
Wolter, C., Menzel, M., Meinel, C. : Modelling Security Goals in Business Processes. In: Modellierung, pp. 197-212 (2008)
-
(2008)
Modelling Security Goals in Business Processes
, pp. 197-212
-
-
Wolter, C.1
Menzel, M.2
Meinel, C.3
|