메뉴 건너뛰기




Volumn 7781 LNCS, Issue , 2013, Pages 75-90

Compositional verification of application-level security properties

Author keywords

[No Author keywords available]

Indexed keywords

ANDROID APPLICATIONS; AUTOMATIC MODELING; COMPOSITIONAL VERIFICATION; FUNCTIONAL BEHAVIORS; MODEL-BASED ENGINEERING; REAL-LIFE APPLICATIONS; SECURITY PROPERTIES; SECURITY REQUIREMENTS;

EID: 84893126507     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36563-8_6     Document Type: Conference Paper
Times cited : (10)

References (32)
  • 3
    • 71749097369 scopus 로고    scopus 로고
    • Tool support for the rapid composition, analysis and implementation of reactive services
    • Kraemer, F.A., Slåtten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software 82(12), 2068-2080 (2009)
    • (2009) Journal of Systems and Software , vol.82 , Issue.12 , pp. 2068-2080
    • Kraemer, F.A.1    Slåtten, V.2    Herrmann, P.3
  • 4
    • 73349088987 scopus 로고    scopus 로고
    • Towards the integration of security aspects into system development using collaboration-oriented models
    • Ślezak, D., Kim, T.-H., Fang, W.-C., Arnett, K.P. (eds.), Springer, Heidelberg
    • Gunawan, L.A., Herrmann, P., Kraemer, F.A.: Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. In: Ślezak, D., Kim, T.-H., Fang, W.-C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol. 58, pp. 72-85. Springer, Heidelberg (2009)
    • (2009) SecTech 2009. CCIS , vol.58 , pp. 72-85
    • Gunawan, L.A.1    Herrmann, P.2    Kraemer, F.A.3
  • 5
    • 77954646052 scopus 로고    scopus 로고
    • Reactive semantics for distributed UML activities
    • Hatcliff, J., Zucca, E. (eds.), Springer, Heidelberg
    • Kraemer, F.A., Herrmann, P.: Reactive Semantics for Distributed UML Activities. In: Hatcliff, J., Zucca, E. (eds.) FMOODS/FORTE 2010, Part II. LNCS, vol. 6117, pp. 17-31. Springer, Heidelberg (2010)
    • (2010) FMOODS/FORTE 2010, Part II. LNCS , vol.6117 , pp. 17-31
    • Kraemer, F.A.1    Herrmann, P.2
  • 6
    • 79551530717 scopus 로고    scopus 로고
    • A Tool-supported method for the design and implementation of secure distributed applications
    • Erlingsson, Ú ., Wieringa, R., Zannone, N. (eds.), Springer, Heidelberg
    • Gunawan, L.A., Kraemer, F.A., Herrmann, P.: A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. In: Erlingsson, Ú ., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 142-155. Springer, Heidelberg (2011)
    • (2011) ESSoS 2011. LNCS , vol.6542 , pp. 142-155
    • Gunawan, L.A.1    Kraemer, F.A.2    Herrmann, P.3
  • 11
    • 73349144102 scopus 로고    scopus 로고
    • Automated encapsulation of UML activities for incremental development and verification
    • Schürr,A., Selic, B. (eds.), Springer, Heidelberg
    • Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Schürr,A., Selic, B. (eds.)MODELS 2009. LNCS, vol. 5795, pp. 571-585. Springer, Heidelberg (2009)
    • (2009) MODELS 2009. LNCS , vol.5795 , pp. 571-585
    • Kraemer, F.A.1    Herrmann, P.2
  • 12
    • 79960884512 scopus 로고    scopus 로고
    • Contracts for multi-instance UML activities
    • Bruni, R., Dingel, J. (eds.), Springer, Heidelberg
    • Slåtten, V., Herrmann, P.: Contracts for Multi-instance UML Activities. In: Bruni, R., Dingel, J. (eds.) FMOODS/FORTE 2011. LNCS, vol. 6722, pp. 304-318. Springer, Heidelberg (2011)
    • (2011) FMOODS/FORTE 2011. LNCS , vol.6722 , pp. 304-318
    • Slåtten, V.1    Herrmann, P.2
  • 14
    • 84958641324 scopus 로고    scopus 로고
    • Model checking TLA+ specifications
    • Pierre, L., Kropf, T. (eds.), Springer, Heidelberg
    • Yu, Y., Manolios, P., Lamport, L.: Model Checking TLA+ Specifications. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol. 1703, pp. 54-66. Springer, Heidelberg (1999)
    • (1999) CHARME 1999. LNCS , vol.1703 , pp. 54-66
    • Yu, Y.1    Manolios, P.2    Lamport, L.3
  • 15
    • 0033691822 scopus 로고    scopus 로고
    • A Framework for modeling transfer protocols
    • Herrmann, P., Krumm, H.: A Framework for Modeling Transfer Protocols. Computer Networks 34(2), 317-337 (2000)
    • (2000) Computer Networks , vol.34 , Issue.2 , pp. 317-337
    • Herrmann, P.1    Krumm, H.2
  • 16
    • 0026154452 scopus 로고
    • The existence of refinement mappings
    • Abadi, M., Lamport, L.: The Existence of Refinement Mappings. Theoretical Computer Science 82(2), 253-284 (1991)
    • (1991) Theoretical Computer Science , vol.82 , Issue.2 , pp. 253-284
    • Abadi, M.1    Lamport, L.2
  • 20
    • 60849085437 scopus 로고    scopus 로고
    • An Aspect-oriented methodology for designing secure applications
    • Special Issue: Model-Driven Development for Secure Information Systems
    • Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An Aspect-Oriented Methodology for Designing Secure Applications. Information and Software Technology 51(5), 846-864 (2009); Special Issue: Model-Driven Development for Secure Information Systems
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 846-864
    • Georg, G.1    Ray, I.2    Anastasakis, K.3    Bordbar, B.4    Toahchoodee, M.5    Houmb, S.H.6
  • 21
    • 77952699852 scopus 로고    scopus 로고
    • Aspect-oriented modeling for representing and integrating security concerns in UML
    • Lee, R., Ormandjieva, O., Abran, A., Constantinides, C. (eds.), Springer, Heidelberg
    • Mouheb, D., Talhi, C., Nouh, M., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. In: Lee, R., Ormandjieva, O., Abran, A., Constantinides, C. (eds.) SERA 2010. SCI, vol. 296, pp. 197-213. Springer, Heidelberg (2010)
    • (2010) SERA 2010. SCI , vol.296 , pp. 197-213
    • Mouheb, D.1    Talhi, C.2    Nouh, M.3    Lima, V.4    Debbabi, M.5    Wang, L.6    Pourzandi, M.7
  • 22
    • 33646180594 scopus 로고    scopus 로고
    • Dynamic secure aspect modeling with UML: From models to code
    • Briand, L.C., Williams, C. (eds.), Springer, Heidelberg
    • Jürjens, J., Houmb, S.H.: Dynamic Secure Aspect Modeling with UML: From Models to Code. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 142-155. Springer, Heidelberg (2005)
    • (2005) MoDELS 2005. LNCS , vol.3713 , pp. 142-155
    • Jürjens, J.1    Houmb, S.H.2
  • 23
    • 43449136160 scopus 로고    scopus 로고
    • Model driven design and aspect weaving
    • Jézéquel, J.M.: Model Driven Design and Aspect Weaving. Software and System Modeling 7(2), 209-218 (2008)
    • (2008) Software and System Modeling , vol.7 , Issue.2 , pp. 209-218
    • Jézéquel, J.M.1
  • 25
    • 77949466195 scopus 로고    scopus 로고
    • Formal verification of application-specific security properties in a model-driven approach
    • Massacci, F., Wallach, D., Zannone, N. (eds.), Springer, Heidelberg
    • Moebius, N., Stenzel, K., Reif, W.: Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 166-181. Springer, Heidelberg (2010)
    • (2010) ESSoS 2010. LNCS , vol.5965 , pp. 166-181
    • Moebius, N.1    Stenzel, K.2    Reif, W.3
  • 28
    • 0007863633 scopus 로고    scopus 로고
    • A Framework for an active interface to characterise compositional security contracts of software components
    • Khan, K., Han, J., Zheng, Y.: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. In: Proceedings of the 2001 Australian Software Engineering Conference, pp. 117-126 (2001)
    • (2001) Proceedings of the 2001 Australian Software Engineering Conference , pp. 117-126
    • Khan, K.1    Han, J.2    Zheng, Y.3
  • 29
    • 17644369110 scopus 로고    scopus 로고
    • Information flow analysis of component-structured applications
    • ACM SIGSAC IEEE Computer Society Press, New Orleans
    • Herrmann, P.: Information Flow Analysis of Component-Structured Applications. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), pp. 45-54. ACM SIGSAC, IEEE Computer Society Press, New Orleans (2001)
    • (2001) Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC) , pp. 45-54
    • Herrmann, P.1
  • 31
    • 33746256403 scopus 로고    scopus 로고
    • Security issues in service composition
    • Gorrieri, R., Wehrheim, H. (eds.), Springer, Heidelberg
    • Bartoletti, M., Degano, P., Ferrari, G.L.: Security Issues in Service Composition. In: Gorrieri, R., Wehrheim, H. (eds.) FMOODS 2006. LNCS, vol. 4037, pp. 1-16. Springer, Heidelberg (2006)
    • (2006) FMOODS 2006. LNCS , vol.4037 , pp. 1-16
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.