-
2
-
-
73349144102
-
Automated encapsulation of UML activities for incremental development and verification
-
Languages and Systems (MoDELS), LNCS, Denver, CO, USA, Springer
-
Kraemer FA, Herrmann P. Automated encapsulation of UML activities for incremental development and verification, International Conference on Model Driven Engineering, Languages and Systems (MoDELS), LNCS, Denver, CO, USA, Springer, 2009; 571-585.
-
(2009)
International Conference on Model Driven Engineering
, pp. 571-585
-
-
Kraemer, F.A.1
Herrmann, P.2
-
4
-
-
84911944629
-
-
The SecFutur project: design of secure and energy-efficient embedded systems for future Internet application. last visited May
-
The SecFutur project: design of secure and energy-efficient embedded systems for future Internet application. www.secfutur.eu, last visited May 2013.
-
(2013)
-
-
-
5
-
-
70350663534
-
Engineering reactive systems: a compositional and model-driven method based on collaborative building blocks
-
Ph.D. Thesis, Norwegian University of Science and Technology, August
-
Kraemer F. Engineering reactive systems: a compositional and model-driven method based on collaborative building blocks. Ph.D. Thesis, Norwegian University of Science and Technology, August 2008.
-
(2008)
-
-
Kraemer, F.1
-
6
-
-
71749097369
-
Tool support for the rapid composition, analysis and implementation of reactive services
-
Kraemer FA, Slåtten V, Herrmann P. Tool support for the rapid composition, analysis and implementation of reactive services. Journal of Systems and Software 2009; 82(12): 2068-2080.
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.12
, pp. 2068-2080
-
-
Kraemer, F.A.1
Slåtten, V.2
Herrmann, P.3
-
7
-
-
80054064006
-
Engineering android applications based on UML activities
-
LNCS, Wellington, New Zealand, Springer Berlin / Heidelberg
-
Kraemer FA. Engineering android applications based on UML activities, Model Driven Engineering Languages and Systems (MODELS), LNCS, Wellington, New Zealand, Springer Berlin / Heidelberg, 2011; 183-197.
-
(2011)
Model Driven Engineering Languages and Systems (MODELS)
, pp. 183-197
-
-
Kraemer, F.A.1
-
8
-
-
85001799494
-
An ontology of information security
-
IGI Global: Hershey, Pennsylvania, USA
-
Herzog A, Shahmehri N, Duma C. An ontology of information security. In Journal of Techniques and Applications for Advanced Information Privacy and Security. IGI Global: Hershey, Pennsylvania, USA, 2007; 1-23.
-
(2007)
Journal of Techniques and Applications for Advanced Information Privacy and Security
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
9
-
-
84873822340
-
-
Security asset elicitation for collaborative models, Model-Driven Security Workshop (MDSec) in Conjunction with MoDELS, ACM Digital Library (DL), Innsbruck, Austria
-
Vasilevskaya M, Gunawan LA, Nadjm-Tehrani S, Herrmann P. Security asset elicitation for collaborative models, Model-Driven Security Workshop (MDSec) in Conjunction with MoDELS, ACM Digital Library (DL), Innsbruck, Austria, 2012; 7-13.
-
(2012)
, pp. 7-13
-
-
Vasilevskaya, M.1
Gunawan, L.A.2
Nadjm-Tehrani, S.3
Herrmann, P.4
-
10
-
-
84911862860
-
-
MagicDraw. last visited May 2013.
-
MagicDraw. www.magicdraw.com, last visited May 2013.
-
-
-
-
11
-
-
84911928112
-
-
HermiT Reasoner. last visited February 2013.
-
HermiT Reasoner. www.hermit-reasoner.com, last visited February 2013.
-
-
-
-
12
-
-
84911861214
-
-
Acceleo. last visited February 2013.
-
Acceleo. www.eclipse.org/acceleo/, last visited February 2013.
-
-
-
-
13
-
-
84911928446
-
-
ISO/IEC 12207:2008. Systems and software engineering - Software life cycle processes.
-
ISO/IEC 12207:2008. Systems and software engineering - Software life cycle processes.
-
-
-
-
14
-
-
84911876855
-
-
UML Profile for MARTE: modeling and analysis of real-time embedded systems, version 1.1, June Document number: formal/2011-06-02.
-
Object Management Group. UML Profile for MARTE: modeling and analysis of real-time embedded systems, version 1.1, June 2011. Document number: formal/2011-06-02.
-
(2011)
-
-
-
16
-
-
73349088987
-
Towards the integration of security aspects into system development using collaboration-oriented models
-
Ślȩzak D, hoon Kim T, Fang W, Arnett K (eds), Communications in Computer and Information Science. Springer: Berlin Heidelberg
-
Gunawan LA, Herrmann P, Kraemer FA. Towards the integration of security aspects into system development using collaboration-oriented models. In International Conference on Security Technology (SecTech), Ślȩzak D, hoon Kim T, Fang W, Arnett K (eds), Communications in Computer and Information Science. Springer: Berlin Heidelberg, 2009; 72-85.
-
(2009)
International Conference on Security Technology (SecTech)
, pp. 72-85
-
-
Gunawan, L.A.1
Herrmann, P.2
Kraemer, F.A.3
-
17
-
-
79551530717
-
A tool-supported method for the design and implementation of secure distributed applications
-
LNCS. Springer-Verlag: Berlin, Heidelberg
-
Gunawan LA, Kraemer FA, Herrmann P. A tool-supported method for the design and implementation of secure distributed applications. In Engineering Secure Software and Systems (ESSoS), LNCS. Springer-Verlag: Berlin, Heidelberg, 2011; 142-155.
-
(2011)
Engineering Secure Software and Systems (ESSoS)
, pp. 142-155
-
-
Gunawan, L.A.1
Kraemer, F.A.2
Herrmann, P.3
-
18
-
-
84893126507
-
Compositional verification of application-level security properties
-
LNCS. Springer-Verlag: Berlin Heidelberg
-
Gunawan LA, Herrmann P. Compositional verification of application-level security properties. In Engineering Secure Software and Systems (essos), LNCS. Springer-Verlag: Berlin Heidelberg, 2013; 75-90.
-
(2013)
Engineering Secure Software and Systems (essos)
, pp. 75-90
-
-
Gunawan, L.A.1
Herrmann, P.2
-
19
-
-
74049147592
-
Formalizing information security knowledge
-
ACM Symposium on Information, Computer and Communications Security (ASIACCS), ACM
-
Fenz S, Ekelhart A. Formalizing information security knowledge, ACM Symposium on Information, Computer and Communications Security (ASIACCS), ACM, 2009; 183-194.
-
(2009)
, pp. 183-194
-
-
Fenz, S.1
Ekelhart, A.2
-
20
-
-
84911916210
-
-
Unified modeling language: superstructure, version 2.4.1, August, Document number: formal/2011-08-06.
-
Object Management Group. Unified modeling language: superstructure, version 2.4.1, August 2011. Document number: formal/2011-08-06.
-
(2011)
-
-
-
21
-
-
84867653071
-
-
Experiences of applying uml/marte on three industrial projects, Model Driven Engineering Languages and Systems, MoDELS), Innsbruck, Austria, Springer
-
Iqbal MZ, Ali S, Yue T, Briand L. Experiences of applying uml/marte on three industrial projects, Model Driven Engineering Languages and Systems, (MoDELS), Innsbruck, Austria, Springer, 2012; 642-658.
-
(2012)
, pp. 642-658
-
-
Iqbal, M.Z.1
Ali, S.2
Yue, T.3
Briand, L.4
-
22
-
-
84911896370
-
-
CoFluent methodology for UML. cofluent design, white paper 2010.
-
Robert T, Perrier V. CoFluent methodology for UML. cofluent design, white paper 2010.
-
-
-
Robert, T.1
Perrier, V.2
-
24
-
-
84911896223
-
-
Support for cross-domain composition of embedded systems using MARTE models. Submitted 2013.
-
Vasilevskaya M, Nadjm-Tehrani S. Support for cross-domain composition of embedded systems using MARTE models. Submitted 2013.
-
-
-
Vasilevskaya, M.1
Nadjm-Tehrani, S.2
-
26
-
-
79959417399
-
Diff and merge support for model based development
-
Leipzig, Germany, ACM
-
Bendix L, Emanuelsson P. Diff and merge support for model based development, Workshop on Comparison and Versioning of Software Models (CVSM), Leipzig, Germany, ACM, 2008; 31-34.
-
(2008)
Workshop on Comparison and Versioning of Software Models (CVSM)
, pp. 31-34
-
-
Bendix, L.1
Emanuelsson, P.2
-
27
-
-
84911879101
-
-
EMF Compare. last visited April 2013.
-
EMF Compare. www.eclipse.org/emf/compare/, last visited April 2013.
-
-
-
-
28
-
-
84911889438
-
-
SiDiff. last visited May 2013.
-
SiDiff. http://pi.informatik.uni-siegen.de/sidiff/, last visited May 2013.
-
-
-
-
29
-
-
84911907425
-
-
IEEE Press: USA, NJ
-
Georg G, Anastasakis K, Bordbar B, Houmb S, Ray I, Toahchoodee M. Verification and Trade-Off Analysis of Security Properties in UML System Models. IEEE Press: USA, NJ, 2010.
-
(2010)
Verification and Trade-Off Analysis of Security Properties in UML System Models
-
-
Georg, G.1
Anastasakis, K.2
Bordbar, B.3
Houmb, S.4
Ray, I.5
Toahchoodee, M.6
-
30
-
-
84911897519
-
-
OMAP3530. last visited Feburary 2013.
-
OMAP3530. www.ti.com, last visited Feburary 2013.
-
-
-
-
31
-
-
84911947614
-
-
ADE7758: poly phase multifunction energy metering ic with per phase information. last visited Feburary 2013.
-
ADE7758: poly phase multifunction energy metering ic with per phase information. www.analog.com, last visited Feburary 2013.
-
-
-
-
32
-
-
84911905405
-
-
Springer-Verlag: Berlin and Heidelberg
-
Braber F, Hogganvik I, Lund MS, Stølen K, Vraalsen F. Model-Based Security Analysis in Seven Steps - a Guided Tour to the CORAS Method. Springer-Verlag: Berlin and Heidelberg, 2007.
-
(2007)
Model-Based Security Analysis in Seven Steps - a Guided Tour to the CORAS Method
-
-
Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stølen, K.4
Vraalsen, F.5
-
33
-
-
2342652200
-
Tamper resistance mechanisms for secure embedded systems
-
Mumbai, India, IEEE
-
Ravi S, Raghunathan A, Chakradhar S. Tamper resistance mechanisms for secure embedded systems, International Conference on VLSI Design, Mumbai, India, IEEE, 2004; 605-611.
-
(2004)
International Conference on VLSI Design
, pp. 605-611
-
-
Ravi, S.1
Raghunathan, A.2
Chakradhar, S.3
-
34
-
-
84911885009
-
-
Ontology Language Manchester Syntax. last visited April 2013.
-
Ontology Language Manchester Syntax. www.w3.org/TR/owl2-manchester-syntax/, last visited April 2013.
-
-
-
-
35
-
-
0004116989
-
-
2nd edn. The MIT Press and McGraw-Hill Book Company: Cambridge, MA, USA
-
Cormen TH, Stein C, Rivest RL, Leiserson CE. Introduction to Algorithms, 2nd edn. The MIT Press and McGraw-Hill Book Company: Cambridge, MA, USA, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Stein, C.2
Rivest, R.L.3
Leiserson, C.E.4
-
36
-
-
33750050331
-
-
John Wiley & Sons: West Sussex, England
-
Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons: West Sussex, England, 2005.
-
(2005)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
37
-
-
80054068410
-
Enforcing S&D pattern design in RCES with modeling and formal approaches
-
Wellington, New Zealand
-
Hamid B, Gürgens S, Jouvray C, Desnos N. Enforcing S&D pattern design in RCES with modeling and formal approaches, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MoDELS), Wellington, New Zealand, 2011; 319-333.
-
(2011)
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MoDELS)
, pp. 319-333
-
-
Hamid, B.1
Gürgens, S.2
Jouvray, C.3
Desnos, N.4
-
38
-
-
84911944962
-
-
An aspect-oriented methodology for designing secure applications
-
Georg G, Ray I, Anastasakis K, Bordbar B, Toahchoodee M, Houmb S. An aspect-oriented methodology for designing secure applications, 2009.
-
(2009)
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.6
-
39
-
-
79955143136
-
SecureUML: a UML-based modeling language for model-driven security
-
Dresden, Germany
-
Lodderstedt T, Basin D, Doser J. SecureUML: a UML-based modeling language for model-driven security, International Conference on the Unified Modeling Language (UML), Dresden, Germany, 2002; 426-441.
-
(2002)
International Conference on the Unified Modeling Language (UML)
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
40
-
-
80051991023
-
AVATAR: a SysML environment for the formal verification of safety and security properties
-
IEEE International Conference on New Technologies of Distributed Systems (NOTERE)
-
Pedroza G, Apvrille L, Knorreck D. AVATAR: a SysML environment for the formal verification of safety and security properties, IEEE International Conference on New Technologies of Distributed Systems (NOTERE), 2011.
-
(2011)
-
-
Pedroza, G.1
Apvrille, L.2
Knorreck, D.3
-
41
-
-
84862143068
-
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
-
Pisa, Italy, IEEE Computer Society
-
Ruiz JF, Harjani R, Mana A, Desnitsky V, Kotenko I, Chechulin A. A methodology for the analysis and modeling of security threats and attacks for systems of embedded components, Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Pisa, Italy, IEEE Computer Society, 2012; 261-268.
-
(2012)
Euromicro International Conference on Parallel Distributed and Network-Based Processing (PDP)
, pp. 261-268
-
-
Ruiz, J.F.1
Harjani, R.2
Mana, A.3
Desnitsky, V.4
Kotenko, I.5
Chechulin, A.6
-
42
-
-
78650464838
-
Model-based security and dependability patterns in RCES - the TERESA approach
-
Vienna, Austria, ACM
-
Hamid B, Desnos N, Grepet C, Jouvray C. Model-based security and dependability patterns in RCES - the TERESA approach, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (S&D4RCES), Vienna, Austria, ACM, 2010.
-
(2010)
International Workshop on Security and Dependability for Resource Constrained Embedded Systems (S&D4RCES)
-
-
Hamid, B.1
Desnos, N.2
Grepet, C.3
Jouvray, C.4
-
43
-
-
34250158136
-
Integrating security modeling into embedded system design
-
Tucson, Arizona, USA
-
Eby M, Werner J, Karsai G, Ledeczi A. Integrating security modeling into embedded system design, IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS), Tucson, Arizona, USA, 2007; 221-228.
-
(2007)
IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS)
, pp. 221-228
-
-
Eby, M.1
Werner, J.2
Karsai, G.3
Ledeczi, A.4
-
44
-
-
84863908276
-
Modeling security aspects in distributed real-time component-based embedded systems
-
Las Vegas, Nevada, USA
-
Saadatmand M, Leveque T. Modeling security aspects in distributed real-time component-based embedded systems, International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, 2012; 43-444.
-
(2012)
International Conference on Information Technology: New Generations (ITNG)
, pp. 43-444
-
-
Saadatmand, M.1
Leveque, T.2
-
47
-
-
84893810797
-
An ontology-based framework for domain-specific modeling
-
Walter T, Parreiras FS, Staab S. An ontology-based framework for domain-specific modeling. Software & Systems Modeling 2012: 408-422, DOI 10.1007/s10270-012-0249-9.
-
(2012)
Software & Systems Modeling
, pp. 408-422
-
-
Walter, T.1
Parreiras, F.S.2
Staab, S.3
-
48
-
-
0004161809
-
Software Product Lines: Practices and Patterns
-
Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA.
-
Clements P, Northrop L. Software Product Lines: Practices and Patterns, The SEI Series in Software Engineering. Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA., 2001.
-
(2001)
The SEI Series in Software Engineering
-
-
Clements, P.1
Northrop, L.2
-
49
-
-
84871211108
-
Scalable RDF data compression with MapReduce
-
Urbani J, Maassen J, Drost N, Seinstra F, Bal H. Scalable RDF data compression with MapReduce. Concurrency and Computation: Practice and Experience 2013: 24-39, DOI: 10.1002/cpe.2840.
-
(2013)
Concurrency and Computation: Practice and Experience
, pp. 24-39
-
-
Urbani, J.1
Maassen, J.2
Drost, N.3
Seinstra, F.4
Bal, H.5
|