-
1
-
-
31344463085
-
Security vulnerabilities-from data analysis to protection mechanisms
-
Iyer, R.K., Chen, S., Xu, J., Kalbarczyk, Z.: Security Vulnerabilities-from Data Analysis to Protection Mechanisms. In: Proceedings of the Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2003, pp. 331-338 (2003)
-
(2003)
Proceedings of the Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2003
, pp. 331-338
-
-
Iyer, R.K.1
Chen, S.2
Xu, J.3
Kalbarczyk, Z.4
-
3
-
-
71749097369
-
Tool support for the rapid composition, analysis and implementation of reactive services
-
Kraemer, F.A., Slåtten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software 82(12), 2068-2080 (2009)
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.12
, pp. 2068-2080
-
-
Kraemer, F.A.1
Slåtten, V.2
Herrmann, P.3
-
4
-
-
73349088987
-
Towards the integration of security aspects into system development using collaboration-oriented models
-
Ślezak, D., Kim, T.-H., Fang, W.-C., Arnett, K.P. (eds.), Springer, Heidelberg
-
Gunawan, L.A., Herrmann, P., Kraemer, F.A.: Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models. In: Ślezak, D., Kim, T.-H., Fang, W.-C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol. 58, pp. 72-85. Springer, Heidelberg (2009)
-
(2009)
SecTech 2009. CCIS
, vol.58
, pp. 72-85
-
-
Gunawan, L.A.1
Herrmann, P.2
Kraemer, F.A.3
-
5
-
-
77954646052
-
Reactive semantics for distributed UML activities
-
Hatcliff, J., Zucca, E. (eds.), Springer, Heidelberg
-
Kraemer, F.A., Herrmann, P.: Reactive Semantics for Distributed UML Activities. In: Hatcliff, J., Zucca, E. (eds.) FMOODS/FORTE 2010, Part II. LNCS, vol. 6117, pp. 17-31. Springer, Heidelberg (2010)
-
(2010)
FMOODS/FORTE 2010, Part II. LNCS
, vol.6117
, pp. 17-31
-
-
Kraemer, F.A.1
Herrmann, P.2
-
6
-
-
79551530717
-
A Tool-supported method for the design and implementation of secure distributed applications
-
Erlingsson, Ú ., Wieringa, R., Zannone, N. (eds.), Springer, Heidelberg
-
Gunawan, L.A., Kraemer, F.A., Herrmann, P.: A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. In: Erlingsson, Ú ., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 142-155. Springer, Heidelberg (2011)
-
(2011)
ESSoS 2011. LNCS
, vol.6542
, pp. 142-155
-
-
Gunawan, L.A.1
Kraemer, F.A.2
Herrmann, P.3
-
9
-
-
81455154930
-
Towards automatic generation of formal specifications to validate and verify reliable distributed systems: A method exemplified by an industrial case study
-
ACM, New York
-
Slåtten, V., Kraemer, F.A., Herrmann, P.: Towards Automatic Generation of Formal Specifications to Validate and Verify Reliable Distributed Systems: A Method Exemplified by an Industrial Case Study. In: Proceedings of the 10th ACM International Conference on Generative Programming and Component Engineering, pp. 147-156. ACM, New York (2011)
-
(2011)
Proceedings of the 10th ACM International Conference on Generative Programming and Component Engineering
, pp. 147-156
-
-
Slåtten, V.1
Kraemer, F.A.2
Herrmann, P.3
-
11
-
-
73349144102
-
Automated encapsulation of UML activities for incremental development and verification
-
Schürr,A., Selic, B. (eds.), Springer, Heidelberg
-
Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Schürr,A., Selic, B. (eds.)MODELS 2009. LNCS, vol. 5795, pp. 571-585. Springer, Heidelberg (2009)
-
(2009)
MODELS 2009. LNCS
, vol.5795
, pp. 571-585
-
-
Kraemer, F.A.1
Herrmann, P.2
-
12
-
-
79960884512
-
Contracts for multi-instance UML activities
-
Bruni, R., Dingel, J. (eds.), Springer, Heidelberg
-
Slåtten, V., Herrmann, P.: Contracts for Multi-instance UML Activities. In: Bruni, R., Dingel, J. (eds.) FMOODS/FORTE 2011. LNCS, vol. 6722, pp. 304-318. Springer, Heidelberg (2011)
-
(2011)
FMOODS/FORTE 2011. LNCS
, vol.6722
, pp. 304-318
-
-
Slåtten, V.1
Herrmann, P.2
-
14
-
-
84958641324
-
Model checking TLA+ specifications
-
Pierre, L., Kropf, T. (eds.), Springer, Heidelberg
-
Yu, Y., Manolios, P., Lamport, L.: Model Checking TLA+ Specifications. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol. 1703, pp. 54-66. Springer, Heidelberg (1999)
-
(1999)
CHARME 1999. LNCS
, vol.1703
, pp. 54-66
-
-
Yu, Y.1
Manolios, P.2
Lamport, L.3
-
15
-
-
0033691822
-
A Framework for modeling transfer protocols
-
Herrmann, P., Krumm, H.: A Framework for Modeling Transfer Protocols. Computer Networks 34(2), 317-337 (2000)
-
(2000)
Computer Networks
, vol.34
, Issue.2
, pp. 317-337
-
-
Herrmann, P.1
Krumm, H.2
-
16
-
-
0026154452
-
The existence of refinement mappings
-
Abadi, M., Lamport, L.: The Existence of Refinement Mappings. Theoretical Computer Science 82(2), 253-284 (1991)
-
(1991)
Theoretical Computer Science
, vol.82
, Issue.2
, pp. 253-284
-
-
Abadi, M.1
Lamport, L.2
-
18
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006)
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
19
-
-
20444505719
-
MAC and UML for secure software design
-
ACM, New York
-
Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for Secure Software Design. In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, pp. 75-85. ACM, New York (2004)
-
(2004)
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
20
-
-
60849085437
-
An Aspect-oriented methodology for designing secure applications
-
Special Issue: Model-Driven Development for Secure Information Systems
-
Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An Aspect-Oriented Methodology for Designing Secure Applications. Information and Software Technology 51(5), 846-864 (2009); Special Issue: Model-Driven Development for Secure Information Systems
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
21
-
-
77952699852
-
Aspect-oriented modeling for representing and integrating security concerns in UML
-
Lee, R., Ormandjieva, O., Abran, A., Constantinides, C. (eds.), Springer, Heidelberg
-
Mouheb, D., Talhi, C., Nouh, M., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. In: Lee, R., Ormandjieva, O., Abran, A., Constantinides, C. (eds.) SERA 2010. SCI, vol. 296, pp. 197-213. Springer, Heidelberg (2010)
-
(2010)
SERA 2010. SCI
, vol.296
, pp. 197-213
-
-
Mouheb, D.1
Talhi, C.2
Nouh, M.3
Lima, V.4
Debbabi, M.5
Wang, L.6
Pourzandi, M.7
-
22
-
-
33646180594
-
Dynamic secure aspect modeling with UML: From models to code
-
Briand, L.C., Williams, C. (eds.), Springer, Heidelberg
-
Jürjens, J., Houmb, S.H.: Dynamic Secure Aspect Modeling with UML: From Models to Code. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 142-155. Springer, Heidelberg (2005)
-
(2005)
MoDELS 2005. LNCS
, vol.3713
, pp. 142-155
-
-
Jürjens, J.1
Houmb, S.H.2
-
23
-
-
43449136160
-
Model driven design and aspect weaving
-
Jézéquel, J.M.: Model Driven Design and Aspect Weaving. Software and System Modeling 7(2), 209-218 (2008)
-
(2008)
Software and System Modeling
, vol.7
, Issue.2
, pp. 209-218
-
-
Jézéquel, J.M.1
-
25
-
-
77949466195
-
Formal verification of application-specific security properties in a model-driven approach
-
Massacci, F., Wallach, D., Zannone, N. (eds.), Springer, Heidelberg
-
Moebius, N., Stenzel, K., Reif, W.: Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 166-181. Springer, Heidelberg (2010)
-
(2010)
ESSoS 2010. LNCS
, vol.5965
, pp. 166-181
-
-
Moebius, N.1
Stenzel, K.2
Reif, W.3
-
26
-
-
84873866087
-
Incremental development of large, secure smart card applications
-
to appear
-
Moebius, N., Stenzel, K., Borek, M., Reif, W.: Incremental Development of Large, Secure Smart Card Applications. In: Proceedings of the 1st Model-Driven Security Workshop, MDSec 2012 (to appear, 2012)
-
(2012)
Proceedings of the 1st Model-Driven Security Workshop, MDSec 2012
-
-
Moebius, N.1
Stenzel, K.2
Borek, M.3
Reif, W.4
-
27
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Yi, D., Wang, J., Tsai, J.J., Beznosov, K.: An Approach for Modeling and Analysis of Security System Architectures. IEEE Transactions on Knowledge and Data Engineering 15(5), 1099-1119 (2003)
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Yi, D.1
Wang, J.2
Tsai, J.J.3
Beznosov, K.4
-
28
-
-
0007863633
-
A Framework for an active interface to characterise compositional security contracts of software components
-
Khan, K., Han, J., Zheng, Y.: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. In: Proceedings of the 2001 Australian Software Engineering Conference, pp. 117-126 (2001)
-
(2001)
Proceedings of the 2001 Australian Software Engineering Conference
, pp. 117-126
-
-
Khan, K.1
Han, J.2
Zheng, Y.3
-
29
-
-
17644369110
-
Information flow analysis of component-structured applications
-
ACM SIGSAC IEEE Computer Society Press, New Orleans
-
Herrmann, P.: Information Flow Analysis of Component-Structured Applications. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), pp. 45-54. ACM SIGSAC, IEEE Computer Society Press, New Orleans (2001)
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC)
, pp. 45-54
-
-
Herrmann, P.1
-
31
-
-
33746256403
-
Security issues in service composition
-
Gorrieri, R., Wehrheim, H. (eds.), Springer, Heidelberg
-
Bartoletti, M., Degano, P., Ferrari, G.L.: Security Issues in Service Composition. In: Gorrieri, R., Wehrheim, H. (eds.) FMOODS 2006. LNCS, vol. 4037, pp. 1-16. Springer, Heidelberg (2006)
-
(2006)
FMOODS 2006. LNCS
, vol.4037
, pp. 1-16
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
32
-
-
84873822340
-
Security asset elicitation for collaborative models
-
to appear 2012
-
Vasilevskaya, M., Gunawan, L.A., Nadjm-Tehrani, S., Herrmann, P.: Security Asset Elicitation for Collaborative Models. In: Proceedings of the 1st Model-Driven Security Workshop, MDSec 2012 (to appear, 2012)
-
(2012)
Proceedings of the 1st Model-Driven Security Workshop MDSec
-
-
Vasilevskaya, M.1
Gunawan, L.A.2
Nadjm-Tehrani, S.3
Herrmann, P.4
|