-
2
-
-
84867967777
-
An analysis of the cloud computing security problem
-
Sydney, Australia
-
Almorsy, M., Grundy, J., Mueller, I.: An analysis of the cloud computing security problem. In: Proc. of 2010 Asia Pacific Cloud Workshop, Colocated with APSEC, Sydney, Australia (2010)
-
(2010)
Proc. of 2010 Asia Pacific Cloud Workshop, Colocated with APSEC
-
-
Almorsy, M.1
Grundy, J.2
Mueller, I.3
-
3
-
-
84866948395
-
Supporting automated software re-engineering using re-aspects
-
New York, NY, USA 2012 ACM New York
-
Almorsy, M., Grundy, J., Ibrahim, A.S.: Supporting automated software re-engineering using re-aspects. In: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering ASE 2012, New York, NY, USA, 2012, pp. 230-233. ACM, New York (2012)
-
(2012)
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering ASE 2012
, pp. 230-233
-
-
Almorsy, M.1
Grundy, J.2
Ibrahim, A.S.3
-
5
-
-
57049172592
-
Security protocols, properties, and their monitoring
-
New York, NY, USA 2008 ACM New York 10.1145/1370905.1370910
-
Bauer, A., Jürjens, J.: Security protocols, properties, and their monitoring. In: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS '08. New York, NY, USA, 2008. pp. 33-40. ACM, New York (2008)
-
(2008)
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS '08
, pp. 33-40
-
-
Bauer, A.1
Jürjens, J.2
-
6
-
-
85008066028
-
-
Models@run.time
-
Blair, G., Bencomo, N., Frame, R.B.: Models@run.time. IEEE Comput., 22-27 (2009)
-
(2009)
IEEE Comput.
, pp. 22-27
-
-
Blair, G.1
Bencomo, N.2
Frame, R.B.3
-
7
-
-
79952373283
-
Toward a framework for cloud security algorithms and architectures for parallel processing
-
6082 Springer Berlin
-
Brock, M., Goscinski, A.: Toward a framework for cloud security algorithms and architectures for parallel processing. In: Lecture Notes in Computer Science, vol. 6082, pp. 254-263. Springer, Berlin (2010)
-
(2010)
Lecture Notes in Computer Science
, pp. 254-263
-
-
Brock, M.1
Goscinski, A.2
-
8
-
-
74349107697
-
An end-to-end methodology and toolkit for fine granularity SaaS-ization
-
21-25 Sept. 2009 10.1109/CLOUD.2009.63
-
Cai, H., Zhang, K., Zhou, M.J., Gong, W., Cai, J.J., Mao, X.S.: An end-to-end methodology and toolkit for fine granularity SaaS-ization. In: 2009 IEEE International Conference on Cloud Computing, 21-25 Sept. 2009, pp. 101-108 (2009)
-
(2009)
2009 IEEE International Conference on Cloud Computing
, pp. 101-108
-
-
Cai, H.1
Zhang, K.2
Zhou, M.J.3
Gong, W.4
Cai, J.J.5
Mao, X.S.6
-
9
-
-
78049326027
-
A transparent approach of enabling SaaS multi-tenancy in the cloud
-
5-10 July 2010 10.1109/SERVICES.2010.48
-
Cai, H., Wang, N., Zhou, M.J.: A transparent approach of enabling SaaS multi-tenancy in the cloud. In: 2010 6th World Congress on Services, 5-10 July 2010, pp. 40-47 (2010)
-
(2010)
2010 6th World Congress on Services
, pp. 40-47
-
-
Cai, H.1
Wang, N.2
Zhou, M.J.3
-
10
-
-
48749122736
-
-
Technical Report 2004-16, University of Buffalo, US
-
Chinchani, R., Iyer, A., Ngo, H., Upadhyaya, S.: A target-centric formal model for insider threat and more. Technical Report 2004-16, University of Buffalo, US (2004)
-
(2004)
A Target-centric Formal Model for Insider Threat and More
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.3
Upadhyaya, S.4
-
12
-
-
49949083649
-
A framework for native multi-tenancy application development and management
-
23-26 July 2007
-
Guo, C.J., Sun, W., Huang, Y., Wang, Z.H., Gao, B.: A framework for native multi-tenancy application development and management. In: The 9th IEEE International Conference on E-Commerce Technology and 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, 2007. CEC/EEE 2007, 23-26 July 2007, pp. 551-558 (2007)
-
(2007)
The 9th IEEE International Conference on E-Commerce Technology and 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, 2007. CEC/EEE 2007
, pp. 551-558
-
-
Guo, C.J.1
Sun, W.2
Huang, Y.3
Wang, Z.H.4
Gao, B.5
-
13
-
-
73149108190
-
Seaas - A reference architecture for security services in soa
-
Hafner, M., Memon, M., Breu, R.: Seaas - a reference architecture for security services in soa. J. Univers. Comput. Sci. 15, 2916-2936 (2009)
-
(2009)
J. Univers. Comput. Sci.
, vol.15
, pp. 2916-2936
-
-
Hafner, M.1
Memon, M.2
Breu, R.3
-
14
-
-
84898836567
-
-
North-Holland Publishing Co. Amsterdam
-
Hashii, B., Malabarba, S., Pandey, R., Bishop, M.: Supporting Reconfigurable Security Policies for Mobile Programs. North-Holland Publishing Co., Amsterdam (2000)
-
(2000)
Supporting Reconfigurable Security Policies for Mobile Programs
-
-
Hashii, B.1
Malabarba, S.2
Pandey, R.3
Bishop, M.4
-
15
-
-
84864355928
-
A unified attribute-based access control model covering dac, mac and rbac
-
Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering dac, mac and rbac. In: Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, pp. 41-55 (2012)
-
(2012)
Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
, pp. 41-55
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
17
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
Lecture Notes in Computer Science 2029 Springer Berlin 10.1007/3-540-45314-8-14
-
Jürjens, J.: Towards development of secure systems using UMLsec. In: Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science, vol. 2029, pp. 187-200. Springer, Berlin (2001)
-
(2001)
Fundamental Approaches to Software Engineering
, pp. 187-200
-
-
Jürjens, J.1
-
19
-
-
17744386105
-
System goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
Monterey 2003 ACM New York
-
Lamsweerde, A., Brohez, S., et al.: System goals to intruder anti-goals: attack generation and resolution for security requirements engineering. In: Proc. of the 3rd Workshop on Requirements for High Assurance Systems, Monterey, 2003, pp. 49-56. ACM, New York (2003)
-
(2003)
Proc. of the 3rd Workshop on Requirements for High Assurance Systems
, pp. 49-56
-
-
Lamsweerde, A.1
Brohez, S.2
-
20
-
-
84860672038
-
Secure i*: Engineering secure software systems through social analysis
-
10.1007/s10207-008-0068-8
-
Liu, L., Yu, E., Mylopoulos, J.: Secure i*: engineering secure software systems through social analysis. Int. J. Softw. Inf. 3, 89-120 (2009)
-
(2009)
Int. J. Softw. Inf.
, vol.3
, pp. 89-120
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
21
-
-
79955143136
-
Secureuml: A uml-based modeling language for model-driven security
-
Dresden, Germany 2002 2460 Springer Berlin
-
Lodderstedt, T., Basin, D., Doser, J.: Secureuml: a uml-based modeling language for model-driven security. In: The 5th International Conference on the Unified Modeling Language, Dresden, Germany, 2002, vol. 2460, pp. 426-441. Springer, Berlin (2002)
-
(2002)
The 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
23
-
-
33750273034
-
Applying a security requirements engineering process
-
D. Gollmann J. Meier A. Sabelfeld (eds) Lecture Notes in Computer Science 4189 Springer Berlin 10.1007/11863908-13
-
Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) Computer Security - ESORICS 2006. Lecture Notes in Computer Science, vol. 4189, pp. 192-206. Springer, Berlin (2006)
-
(2006)
Computer Security - ESORICS 2006
, pp. 192-206
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
24
-
-
78049341379
-
The service security lab: A model-driven platform to compose and explore service security in the cloud
-
5-10 July 2010 10.1109/SERVICES.2010.90
-
Menzel, M., Warschofsky, R., Thomas, I., Willems, C., Meinel, C.: The service security lab: a model-driven platform to compose and explore service security in the cloud. In: 2010 6th World Congress on Services, 5-10 July 2010, pp. 115-122 (2010)
-
(2010)
2010 6th World Congress on Services
, pp. 115-122
-
-
Menzel, M.1
Warschofsky, R.2
Thomas, I.3
Willems, C.4
Meinel, C.5
-
25
-
-
51049123377
-
Defining composite configurable SaaS application packages using sca, variability descriptors and multi-tenancy patterns
-
8-13 June 2008 10.1109/ICIW.2008.68
-
Mietzner, R., Leymann, F., Papazoglou, M.P.: Defining composite configurable SaaS application packages using sca, variability descriptors and multi-tenancy patterns. In: Third International Conference on Internet and Web Applications and Services, 2008. ICIW '08, 8-13 June 2008, pp. 156-161 (2008)
-
(2008)
Third International Conference on Internet and Web Applications and Services, 2008. ICIW '08
, pp. 156-161
-
-
Mietzner, R.1
Leymann, F.2
Papazoglou, M.P.3
-
26
-
-
78649774668
-
Tool support for code generation from a UMLsec property
-
New York, NY, USA 2010 ACM New York 10.1145/1858996.1859074
-
Montrieux, L., Jürjens, J., Haley, C.B., Yu, Y., Schobbens, P.-Y., Toussaint, H.: Tool support for code generation from a UMLsec property. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE '10, New York, NY, USA, 2010, pp. 357-358. ACM, New York (2010)
-
(2010)
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE '10
, pp. 357-358
-
-
Montrieux, L.1
Jürjens, J.2
Haley, C.B.3
Yu, Y.4
Schobbens, P.-Y.5
Toussaint, H.6
-
27
-
-
70350303567
-
Taming dynamically adaptive systems using models and aspects
-
Vancouver, BC 2009 IEEE Computer Society Washington
-
Morin, B., Barais, O., Nain, G., et al.: Taming dynamically adaptive systems using models and aspects. In: IEEE 31st Int. Conf. on Software Engineering, Vancouver, BC, 2009, pp. 122-132. IEEE Computer Society, Washington (2009)
-
(2009)
IEEE 31st Int. Conf. on Software Engineering
, pp. 122-132
-
-
Morin, B.1
Barais, O.2
Nain, G.3
-
28
-
-
84898858145
-
-
ACM New York
-
Morin, B., Mouelhi, T., Fleurey, F., Traon, Y., Barais, O., Jézéquelet, J.: Security-Driven Model-Based Dynamic Adaptation. ACM, New York (2010)
-
(2010)
Security-Driven Model-Based Dynamic Adaptation
-
-
Morin, B.1
Mouelhi, T.2
Fleurey, F.3
Traon, Y.4
Barais, O.5
Jézé quelet, J.6
-
29
-
-
84861091710
-
A model-based framework for security policy specification, deployment and testing
-
France 2008 Springer Berlin
-
Mouelhi, T., Fleurey, F., Baudry, B., Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Proceedings of the 11th Int. Conf. on Model Driven Engineering Languages and Systems, France, 2008. Springer, Berlin (2008)
-
(2008)
Proceedings of the 11th Int. Conf. on Model Driven Engineering Languages and Systems
-
-
Mouelhi, T.1
Fleurey, F.2
Baudry, B.3
Traon, Y.4
-
31
-
-
77952651389
-
Multi-tenant, secure, load disseminated SaaS architecture
-
7-10 Feb. 2010 1
-
Pervez, Z., Lee, S., Lee, Y.-K.: Multi-tenant, secure, load disseminated SaaS architecture. In: 2010 the 12th International Conference on Advanced Communication Technology, 7-10 Feb. 2010, vol. 1, pp. 214-219 (2010)
-
(2010)
2010 the 12th International Conference on Advanced Communication Technology
, pp. 214-219
-
-
Pervez, Z.1
Lee, S.2
Lee, Y.-K.3
-
32
-
-
77952651389
-
Multi-tenant, secure, load disseminated SaaS architecture
-
Gangwon-Do, South Korea IEEE Press New York
-
Pervez, Z., Lee, S., Lee, Y.-K.: Multi-tenant, secure, load disseminated SaaS architecture. In: Proceedings of the 12th International Conference on Advanced Communication Technology, Gangwon-Do, South Korea, pp. 214-219. IEEE Press, New York (2010)
-
(2010)
Proceedings of the 12th International Conference on Advanced Communication Technology
, pp. 214-219
-
-
Pervez, Z.1
Lee, S.2
Lee, Y.-K.3
-
34
-
-
84898863800
-
-
IEEE Computer Society Washington
-
Scott, K., Kumar, N., Velusamy, S., et al.: Retargetable and Reconfigurable Software Dynamic Translation. IEEE Computer Society, Washington (2003)
-
(2003)
Retargetable and Reconfigurable Software Dynamic Translation
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
-
35
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
10.1007/s00766-004-0194-4
-
Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34-44 (2005)
-
(2005)
Requir. Eng.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
36
-
-
79957665127
-
The role of models and megamodels at runtime
-
Vogel, T., Seibel, A., Giese, H.: The role of models and megamodels at runtime. In: Proceedings of the 2010 International Conference on Models in Software Engineering, pp. 224-238 (2010)
-
(2010)
Proceedings of the 2010 International Conference on Models in Software Engineering
, pp. 224-238
-
-
Vogel, T.1
Seibel, A.2
Giese, H.3
-
37
-
-
77952768385
-
Research and implementation of a new SaaS service execution mechanism with multi-tenancy support
-
IEEE Computer Society Washington 10.1109/ICISE.2009.894
-
Wang, D., Zhang, Y., Zhang, B., Liu, Y.: Research and implementation of a new SaaS service execution mechanism with multi-tenancy support. In: Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering, pp. 336-339. IEEE Computer Society, Washington (2009)
-
(2009)
Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering
, pp. 336-339
-
-
Wang, D.1
Zhang, Y.2
Zhang, B.3
Liu, Y.4
-
38
-
-
77954661643
-
Research and implementation on access control of management-type SaaS
-
16-18 April 2010 10.1109/ICIME.2010.5477832
-
Xu, J., Jinglei, T., Dongjian, H., Linsen, Z., Lin, C., Fang, N.: Research and implementation on access control of management-type SaaS. In: 2010 the 2nd IEEE International Conference on Information Management and Engineering (ICIME), 16-18 April 2010, pp. 388-392 (2010)
-
(2010)
2010 the 2nd IEEE International Conference on Information Management and Engineering (ICIME)
, pp. 388-392
-
-
Xu, J.1
Jinglei, T.2
Dongjian, H.3
Linsen, Z.4
Lin, C.5
Fang, N.6
-
39
-
-
77957828413
-
From isolated tenancy hosted application to multi-tenancy: Toward a systematic migration method for web application
-
16-18 July 2010 10.1109/ICSESS.2010.5552407
-
Zhang, X., Shen, B., Tang, X., Chen, W.: From isolated tenancy hosted application to multi-tenancy: toward a systematic migration method for web application. In: 2010 IEEE International Conference on Software Engineering and Service Sciences (ICSESS), 16-18 July 2010, pp. 209-212 (2010)
-
(2010)
2010 IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
, pp. 209-212
-
-
Zhang, X.1
Shen, B.2
Tang, X.3
Chen, W.4
-
40
-
-
78449234587
-
Construction of a trusted SaaS platform
-
4-5 June 2010 10.1109/SOSE.2010.34
-
Zhong, C., Zhang, J., Xia, Y., Yu, H.: Construction of a trusted SaaS platform. In: 2010 Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE), 4-5 June 2010, pp. 244-251 (2010)
-
(2010)
2010 Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE)
, pp. 244-251
-
-
Zhong, C.1
Zhang, J.2
Xia, Y.3
Yu, H.4
|