메뉴 건너뛰기




Volumn 21, Issue 2, 2014, Pages 187-224

Adaptable, model-driven security engineering for SaaS cloud-based applications

Author keywords

Adaptive security; Model driven engineering; Security engineering; Software as a service; Tenant oriented security

Indexed keywords

SECURITY SYSTEMS;

EID: 84898843700     PISSN: 09288910     EISSN: 15737535     Source Type: Journal    
DOI: 10.1007/s10515-013-0133-z     Document Type: Article
Times cited : (43)

References (40)
  • 7
    • 79952373283 scopus 로고    scopus 로고
    • Toward a framework for cloud security algorithms and architectures for parallel processing
    • 6082 Springer Berlin
    • Brock, M., Goscinski, A.: Toward a framework for cloud security algorithms and architectures for parallel processing. In: Lecture Notes in Computer Science, vol. 6082, pp. 254-263. Springer, Berlin (2010)
    • (2010) Lecture Notes in Computer Science , pp. 254-263
    • Brock, M.1    Goscinski, A.2
  • 9
    • 78049326027 scopus 로고    scopus 로고
    • A transparent approach of enabling SaaS multi-tenancy in the cloud
    • 5-10 July 2010 10.1109/SERVICES.2010.48
    • Cai, H., Wang, N., Zhou, M.J.: A transparent approach of enabling SaaS multi-tenancy in the cloud. In: 2010 6th World Congress on Services, 5-10 July 2010, pp. 40-47 (2010)
    • (2010) 2010 6th World Congress on Services , pp. 40-47
    • Cai, H.1    Wang, N.2    Zhou, M.J.3
  • 13
    • 73149108190 scopus 로고    scopus 로고
    • Seaas - A reference architecture for security services in soa
    • Hafner, M., Memon, M., Breu, R.: Seaas - a reference architecture for security services in soa. J. Univers. Comput. Sci. 15, 2916-2936 (2009)
    • (2009) J. Univers. Comput. Sci. , vol.15 , pp. 2916-2936
    • Hafner, M.1    Memon, M.2    Breu, R.3
  • 17
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UMLsec
    • Lecture Notes in Computer Science 2029 Springer Berlin 10.1007/3-540-45314-8-14
    • Jürjens, J.: Towards development of secure systems using UMLsec. In: Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science, vol. 2029, pp. 187-200. Springer, Berlin (2001)
    • (2001) Fundamental Approaches to Software Engineering , pp. 187-200
    • Jürjens, J.1
  • 19
    • 17744386105 scopus 로고    scopus 로고
    • System goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • Monterey 2003 ACM New York
    • Lamsweerde, A., Brohez, S., et al.: System goals to intruder anti-goals: attack generation and resolution for security requirements engineering. In: Proc. of the 3rd Workshop on Requirements for High Assurance Systems, Monterey, 2003, pp. 49-56. ACM, New York (2003)
    • (2003) Proc. of the 3rd Workshop on Requirements for High Assurance Systems , pp. 49-56
    • Lamsweerde, A.1    Brohez, S.2
  • 20
    • 84860672038 scopus 로고    scopus 로고
    • Secure i*: Engineering secure software systems through social analysis
    • 10.1007/s10207-008-0068-8
    • Liu, L., Yu, E., Mylopoulos, J.: Secure i*: engineering secure software systems through social analysis. Int. J. Softw. Inf. 3, 89-120 (2009)
    • (2009) Int. J. Softw. Inf. , vol.3 , pp. 89-120
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 21
    • 79955143136 scopus 로고    scopus 로고
    • Secureuml: A uml-based modeling language for model-driven security
    • Dresden, Germany 2002 2460 Springer Berlin
    • Lodderstedt, T., Basin, D., Doser, J.: Secureuml: a uml-based modeling language for model-driven security. In: The 5th International Conference on the Unified Modeling Language, Dresden, Germany, 2002, vol. 2460, pp. 426-441. Springer, Berlin (2002)
    • (2002) The 5th International Conference on the Unified Modeling Language , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 23
    • 33750273034 scopus 로고    scopus 로고
    • Applying a security requirements engineering process
    • D. Gollmann J. Meier A. Sabelfeld (eds) Lecture Notes in Computer Science 4189 Springer Berlin 10.1007/11863908-13
    • Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) Computer Security - ESORICS 2006. Lecture Notes in Computer Science, vol. 4189, pp. 192-206. Springer, Berlin (2006)
    • (2006) Computer Security - ESORICS 2006 , pp. 192-206
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 24
    • 78049341379 scopus 로고    scopus 로고
    • The service security lab: A model-driven platform to compose and explore service security in the cloud
    • 5-10 July 2010 10.1109/SERVICES.2010.90
    • Menzel, M., Warschofsky, R., Thomas, I., Willems, C., Meinel, C.: The service security lab: a model-driven platform to compose and explore service security in the cloud. In: 2010 6th World Congress on Services, 5-10 July 2010, pp. 115-122 (2010)
    • (2010) 2010 6th World Congress on Services , pp. 115-122
    • Menzel, M.1    Warschofsky, R.2    Thomas, I.3    Willems, C.4    Meinel, C.5
  • 27
    • 70350303567 scopus 로고    scopus 로고
    • Taming dynamically adaptive systems using models and aspects
    • Vancouver, BC 2009 IEEE Computer Society Washington
    • Morin, B., Barais, O., Nain, G., et al.: Taming dynamically adaptive systems using models and aspects. In: IEEE 31st Int. Conf. on Software Engineering, Vancouver, BC, 2009, pp. 122-132. IEEE Computer Society, Washington (2009)
    • (2009) IEEE 31st Int. Conf. on Software Engineering , pp. 122-132
    • Morin, B.1    Barais, O.2    Nain, G.3
  • 30
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. (2007)
    • (2007) Int. J. Softw. Eng. Knowl. Eng.
    • Mouratidis, H.1    Giorgini, P.2
  • 35
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • 10.1007/s00766-004-0194-4
    • Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34-44 (2005)
    • (2005) Requir. Eng. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.2
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.