-
1
-
-
85067764282
-
-
OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/ access control-xacml-2.0-core-spec-os.pdf.
-
(2005)
-
-
-
2
-
-
85067747931
-
-
SDE: Service Development Environment (2014), http://www.nessos-project.eu/sde.
-
(2014)
-
-
-
3
-
-
58049083589
-
A model-driven approach for the specification and analysis of access control policies
-
Massacci, F., Zannone, N.: A model-driven approach for the specification and analysis of access control policies. In: Proc. of the OTM Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE, pp. 1087–1103 (2008).
-
(2008)
Proc. Of the OTM Confederated International Conferences, Coopis, DOA, GADA, IS, and ODBASE
, pp. 1087-1103
-
-
Massacci, F.1
Zannone, N.2
-
4
-
-
50649102597
-
Model-based tests for access control policies
-
Pretschner, A., Mouelhi, T., Le Traon, Y.: Model-based tests for access control policies. In: Proc. of ICST, pp. 338–347 (2008).
-
(2008)
Proc. Of ICST
, pp. 338-347
-
-
Pretschner, A.1
Mouelhi, T.2
Le Traon, Y.3
-
5
-
-
84883334900
-
A Toolchain for Designing and Testing XACML Policies
-
Bertolino, A., Busch, M., Daoudagh, S., Koch, N., Lonetti, F., Marchetti, E.: A Toolchain for Designing and Testing XACML Policies. In: Proceedings of ICST 2013, Poster (2013).
-
(2013)
Proceedings of ICST 2013, Poster
-
-
Bertolino, A.1
Busch, M.2
Daoudagh, S.3
Koch, N.4
Lonetti, F.5
Marchetti, E.6
-
6
-
-
80054103183
-
Modeling Secure Navigation in Web Information Systems
-
In: Grabis, J., Kirikova, M. (eds.), Springer, Heidelberg
-
Busch, M., Knapp, A., Koch, N.: Modeling Secure Navigation in Web Information Systems. In: Grabis, J., Kirikova, M. (eds.) BIR 2011. LNBIP, vol. 90, pp. 239–253. Springer, Heidelberg (2011).
-
(2011)
BIR 2011. LNBIP
, vol.90
, pp. 239-253
-
-
Busch, M.1
Knapp, A.2
Koch, N.3
-
8
-
-
84925012790
-
Modeling Security Features of Web Applications
-
In: Heisel, M., Joosen, W., Lopez, J., Martinelli, F. (eds.), Springer, Heidelberg
-
Busch, M., Koch, N., Suppan, S.: Modeling Security Features of Web Applications. In: Heisel, M., Joosen, W., Lopez, J., Martinelli, F. (eds.) Engineering Secure Future Internet Services. LNCS, vol. 8431, pp. 119–139. Springer, Heidelberg (2014).
-
(2014)
Engineering Secure Future Internet Services. LNCS
, vol.8431
, pp. 119-139
-
-
Busch, M.1
Koch, N.2
Suppan, S.3
-
10
-
-
85067770912
-
-
Sensoria Project: Software Engineering for Service-Oriented Overlay Computers (2011), http://www.sensoria-ist.eu/.
-
(2011)
-
-
-
11
-
-
85067779820
-
-
ASCENS: Autonomic Service Component Ensembles (2012), http://www.ascens-ist.eu/.
-
(2012)
-
-
-
12
-
-
85067740815
-
-
Eclipse Foundation: Eclipse Modeling Project (2014), http://eclipse.org/modeling/.
-
(2014)
-
-
-
13
-
-
85067771843
-
-
Magicdraw
-
No Magic Inc.: Magicdraw (2014), http://www.magicdraw.com/.
-
(2014)
-
-
-
14
-
-
84873845646
-
Towards model-driven development of access control policies for web applications
-
Busch, M., Koch, N., Masi, M., Pugliese, R., Tiezzi, F.: Towards model-driven development of access control policies for web applications. In: Model-Driven Security Workshop in Conjunction with MoDELS 2012. ACM Digital Library (2012).
-
(2012)
Model-Driven Security Workshop in Conjunction with Models 2012. ACM Digital Library
-
-
Busch, M.1
Koch, N.2
Masi, M.3
Pugliese, R.4
Tiezzi, F.5
-
15
-
-
78449304326
-
Systematic XACML request generation for testing purposes
-
Lille, France, September 1-3
-
Bertolino, A., Lonetti, F., Marchetti, E.: Systematic XACML request generation for testing purposes. In: Proceedings of the 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Lille, France, September 1-3, pp. 3–11 (2010).
-
(2010)
Proceedings of the 36Th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA)
, pp. 3-11
-
-
Bertolino, A.1
Lonetti, F.2
Marchetti, E.3
-
16
-
-
84864887749
-
The X-CREATE framework: A comparison of XACML policy testing strategies
-
Porto, Portugal, April 18-21
-
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.: The X-CREATE framework: a comparison of XACML policy testing strategies. In: Proceedings of 8th International Conference on Web Information Systems and Technologies (WEBIST), Porto, Portugal, April 18-21 (2012).
-
(2012)
Proceedings of 8Th International Conference on Web Information Systems and Technologies (WEBIST)
-
-
Bertolino, A.1
Daoudagh, S.2
Lonetti, F.3
Marchetti, E.4
-
17
-
-
84862306023
-
Automatic XACML Requests Generation for Policy Testing
-
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.: Automatic XACML Requests Generation for Policy Testing. In: Proceedings of IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST), pp. 842–849 (2012).
-
(2012)
Proceedings of IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST)
, pp. 842-849
-
-
Bertolino, A.1
Daoudagh, S.2
Lonetti, F.3
Marchetti, E.4
-
18
-
-
85067780110
-
-
Sun Microsystems: Sun’s XACML Implementation (2006), http://sunxacml.sourceforge.net/.
-
(2006)
-
-
-
19
-
-
70350212978
-
MagicUWE — A CASE Tool Plugin for Modeling Web Applications
-
Gaedke, M., Grossniklaus, M., D´ıaz, O. (eds.), Springer, Heidelberg
-
Busch, M., Koch, N.: MagicUWE — A CASE Tool Plugin for Modeling Web Applications. In: Gaedke, M., Grossniklaus, M., D´ıaz, O. (eds.) ICWE 2009. LNCS, vol. 5648, pp. 505–508. Springer, Heidelberg (2009).
-
(2009)
ICWE 2009. LNCS
, vol.5648
, pp. 505-508
-
-
Busch, M.1
Koch, N.2
-
20
-
-
85067755679
-
-
OMG.: XMI 2.1 (2005), http://www.omg.org/spec/XMI/.
-
(2005)
-
-
-
21
-
-
85067776197
-
-
Eclipse: XPand (2013), http://wiki.eclipse.org/Xpand.
-
(2013)
-
-
-
22
-
-
0000673732
-
The AETG system: An approach to testing based on combinatiorial design
-
Cohen, D.M., Dalal, S.R., Fredman M.L., Patton, G.C.: The AETG system: An approach to testing based on combinatiorial design. IEEE Trans. on Soft. Eng. 23(7), 437–444 (1997).
-
(1997)
IEEE Trans. On Soft. Eng
, vol.23
, Issue.7
, pp. 437-444
-
-
Cohen, D.M.1
Dalal, S.R.2
Fredman, M.L.3
Patton, G.C.4
-
23
-
-
84880878736
-
Automated testing of extensible access control markup language-based access control systems
-
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Schilders, L.: Automated testing of extensible access control markup language-based access control systems. IET Software 7(4), 203–212 (2013).
-
(2013)
IET Software
, vol.7
, Issue.4
, pp. 203-212
-
-
Bertolino, A.1
Daoudagh, S.2
Lonetti, F.3
Marchetti, E.4
Schilders, L.5
-
24
-
-
85067777496
-
-
SDE.: Tutorial (2012), http://sde.pst.ifi.lmu.de/trac/sde/wiki/Tutorial.
-
(2012)
-
-
-
25
-
-
85067748048
-
-
OMG.: OCL 2.0 (2011), http://www.omg.org/spec/OCL/2.0/.
-
(2011)
-
-
-
26
-
-
84908163748
-
Secure Web Engineering supported by an Evaluation Framework
-
Busch, M.: Secure Web Engineering supported by an Evaluation Framework. In: Modelsward 2014. Scitepress (2014).
-
(2014)
Modelsward 2014. Scitepress
-
-
Busch, M.1
-
27
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002).
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
28
-
-
79952860136
-
UACML: Unified Access Control Modeling Language
-
Slimani, N., Khambhammettu, H., Adi, K., Logrippo, L.: UACML: Unified Access Control Modeling Language. In: NTMS 2011, pp. 1–8 (2011).
-
(2011)
NTMS 2011
, pp. 1-8
-
-
Slimani, N.1
Khambhammettu, H.2
Adi, K.3
Logrippo, L.4
-
29
-
-
77949445459
-
Schl¨apfer, M.: Automatic Generation of Smart, Security-Aware GUI Models
-
In: Massacci, F., Wallach, D., Zannone, N. (eds.), Springer, Heidelberg
-
Basin, D., Clavel, M., Egea, M., Schl¨apfer, M.: Automatic Generation of Smart, Security-Aware GUI Models. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 201–217. Springer, Heidelberg (2010).
-
(2010)
Essos 2010. LNCS
, vol.5965
, pp. 201-217
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
-
33
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
ACM, New York
-
Fisler, K., Krishnamurthi, S., Meyerovich, L., Tschantz, M.: Verification and change-impact analysis of access-control policies. In: Proc. of ICSE, pp. 196–205. ACM, New York (2005).
-
(2005)
Proc. Of ICSE
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.3
Tschantz, M.4
-
34
-
-
78449304326
-
Systematic XACML Request Generation for Testing Purposes
-
Bertolino, A., Lonetti, F., Marchetti, E.: Systematic XACML Request Generation for Testing Purposes. In: Proc. of 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), pp. 3–11 (2010).
-
(2010)
Proc. Of 36Th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA)
, pp. 3-11
-
-
Bertolino, A.1
Lonetti, F.2
Marchetti, E.3
-
35
-
-
57449120523
-
Multiple-implementation testing for XACML implementations
-
Li, N., Hwang, J., Xie, T.: Multiple-implementation testing for XACML implementations. In: Proc. of TAV-WEB, pp. 27–33 (2008).
-
(2008)
Proc. Of TAV-WEB
, pp. 27-33
-
-
Li, N.1
Hwang, J.2
Xie, T.3
-
36
-
-
84864272683
-
Testing of PolPA Authorization Systems
-
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Martinelli, F., Mori, P.: Testing of PolPA Authorization Systems. In: Proc. of AST, pp. 8–14 (2012).
-
(2012)
Proc. Of AST
, pp. 8-14
-
-
Bertolino, A.1
Daoudagh, S.2
Lonetti, F.3
Marchetti, E.4
Martinelli, F.5
Mori, P.6
-
37
-
-
47349131989
-
Testing security policies: Going beyond functional testing
-
Traon, Y., Mouelhi, T., Baudry, B.: Testing security policies: going beyond functional testing. In: Proc. of ISSRE, pp. 93–102 (2007).
-
(2007)
Proc. Of ISSRE
, pp. 93-102
-
-
Traon, Y.1
Mouelhi, T.2
Baudry, B.3
-
38
-
-
34548010540
-
A formal approach for testing security rules
-
Mallouli, W., Orset, J.M., Cavalli, A., Cuppens, N., Cuppens, F.: A formal approach for testing security rules. In: Proc. of SACMAT, pp. 127–132 (2007).
-
(2007)
Proc. Of SACMAT
, pp. 127-132
-
-
Mallouli, W.1
Orset, J.M.2
Cavalli, A.3
Cuppens, N.4
Cuppens, F.5
-
39
-
-
37349056999
-
Test generation from security policies specified in or-BAC
-
Li, K., Mounier, L., Groz, R.: Test generation from security policies specified in or-BAC. In: Proc. of COMPSAC, pp. 255–260 (2007).
-
(2007)
Proc. Of COMPSAC
, pp. 255-260
-
-
Li, K.1
Mounier, L.2
Groz, R.3
-
40
-
-
85067754918
-
-
Eclipse: Acceleo (2014), http://www.eclipse.org/acceleo/.
-
(2014)
-
-
|