-
1
-
-
77949445459
-
Automatic Generation of Smart, Security-Aware GUI Models
-
In: Massacci, F., Wallach, D., Zannone, N. (eds.), Springer, Heidelberg
-
Basin, D., Clavel, M., Egea, M., Schläpfer, M.: Automatic Generation of Smart, Security-Aware GUI Models. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 201-217. Springer, Heidelberg (2010).
-
(2010)
Essos 2010. LNCS
, vol.5965
, pp. 201-217
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
Schläpfer, M.4
-
2
-
-
80054103183
-
Modeling Secure Navigation in Web Information Systems
-
In: Grabis, J., Kirikova, M. (eds.), Springer, Heidelberg
-
Busch, M., Knapp, A., Koch, N.: Modeling Secure Navigation in Web Information Systems. In: Grabis, J., Kirikova, M. (eds.) BIR 2011. LNBIP, vol. 90, pp. 239-253. Springer, Heidelberg (2011).
-
(2011)
BIR 2011. LNBIP
, vol.90
, pp. 239-253
-
-
Busch, M.1
Knapp, A.2
Koch, N.3
-
3
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
ACM, New York
-
Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 75-88. ACM, New York (2008).
-
(2008)
Proceedings of the 15Th ACM Conference on Computer and Communications Security, CCS 2008
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
5
-
-
84925010520
-
A Toolchain for Designing and Testing Access Control Policies
-
Heisel, M., Joosen,W., Lopez, J., Martinelli, F. (eds.) , Springer, Heidelberg
-
Bertolino, A., Busch, M., Daoudagh, S., Lonetti, F., Marchetti, E.: A Toolchain for Designing and Testing Access Control Policies. In: Heisel, M., Joosen,W., Lopez, J., Martinelli, F. (eds.) Engineering SecureFuture Internet Services and Systems.LNCS, vol. 8431, pp. 266-286. Springer, Heidelberg (2014).
-
(2014)
Engineering Securefuture Internet Services and Systems.Lncs
, vol.8431
, pp. 266-286
-
-
Bertolino, A.1
Busch, M.2
Daoudagh, S.3
Lonetti, F.4
Marchetti, E.5
-
6
-
-
84924955119
-
-
Cuellar, J., Suppan, S.: A smart metering scenario (2013), https://securitylab.disi.unitn.it/lib/exe/fetch.php?media=research activities:erise:erise 2013:erise2013-smartmeteering-description.pdf.
-
(2013)
A Smart Metering Scenario
-
-
Cuellar, J.1
Suppan, S.2
-
8
-
-
78650381753
-
Microgrids: Integration of distributed energy resources into the smart-grid
-
Guerrero, J.M.: Microgrids: Integration of distributed energy resources into the smart-grid. In: IEEE International Symposium on Industrial Electronics, pp. 4281-4414 (2010).
-
(2010)
IEEE International Symposium on Industrial Electronics
, pp. 4281-4414
-
-
Guerrero, J.M.1
-
10
-
-
84928592347
-
Selection and documentation of the two major applicationcase studies
-
Cubo, J., Cuellar, J., Fries, S., Martín, J.A., Moyano, F., Fernández, G., Gago, M.C.F., Pasic, A., Román, R., Dieguez, R.T., Vinagre, I.: Selection and documentation of the two major applicationcase studies. NESSoS deliverable D11.2 (2011).
-
(2011)
Nessos Deliverable
, vol.11
, pp. 2
-
-
Cubo, J.1
Cuellar, J.2
Fries, S.3
Martín, J.A.4
Moyano, F.5
Fernández, G.6
Gago, M.7
Pasic, A.8
Román, R.9
Dieguez, R.T.10
Vinagre, I.11
-
11
-
-
84924995500
-
-
Technical report, OPEN meter project
-
Gómez, A., Tellechea, M., Rodríguez, C.: D1.1 Requirements of AMI. Technical report, OPEN meter project (2009).
-
(2009)
D1.1 Requirements of AMI
-
-
Gómez, A.1
Tellechea, M.2
Rodríguez, C.3
-
12
-
-
77952176601
-
Decreased time delay and security enhancement recommendations for ami smart meter networks
-
Bennett, C., Wicker, S.: Decreased time delay and security enhancement recommendations for ami smart meter networks. In: Innovative Smart Grid Technologies (ISGT), pp. 1-6 (2010).
-
(2010)
Innovative Smart Grid Technologies (ISGT), Pp. 1-6
-
-
Bennett, C.1
Wicker, S.2
-
13
-
-
85067764663
-
-
Top 10 - 2013
-
OWASP Foundation: OWASP Top 10 - 2013 (2013), http://owasptop10.googlecode.com/files/OWASPTop10-2013.pdf.
-
(2013)
OWASP
-
-
-
14
-
-
85067754634
-
-
OMG.: OCL 2.0 (2011), http://www.omg.org/spec/OCL/2.0/.
-
(2011)
OCL
, vol.2
, pp. 0
-
-
-
15
-
-
84927583977
-
-
No Magic Inc.: Magicdraw (2014), http://www.magicdraw.com/.
-
(2014)
Magicdraw
-
-
-
17
-
-
70350212978
-
MagicUWE — A CASE Tool Plugin for Modeling Web Applications
-
In: Gaedke, M., Grossniklaus, M., Díaz, O. (eds.), Springer, Heidelberg
-
Busch, M., Koch, N.: MagicUWE — A CASE Tool Plugin for Modeling Web Applications. In: Gaedke, M., Grossniklaus, M., Díaz, O. (eds.) ICWE 2009. LNCS, vol. 5648, pp. 505-508. Springer, Heidelberg (2009).
-
(2009)
ICWE 2009. LNCS
, vol.5648
, pp. 505-508
-
-
Busch, M.1
Koch, N.2
-
18
-
-
84924945143
-
Modeling, Enforcing and Testing Secure Navigation Paths for Web Applications. Technical Report 1301
-
Busch, M., Ochoa, M., Schwienbacher, R.: Modeling, Enforcing and Testing Secure Navigation Paths for Web Applications. Technical Report 1301, Ludwig- Maximilians-Universität München (2013).
-
(2013)
Ludwig- Maximilians-Universität München
-
-
Busch, M.1
Ochoa, M.2
Schwienbacher, R.3
-
20
-
-
70350219123
-
UWE4JSF - A Model-Driven Generation Approach for Web Applications
-
In: Gaedke, M., Grossniklaus, M., Díaz, O. (eds.), Springer, Heidelberg
-
Kroiss, C., Koch, N., Knapp, A.: UWE4JSF - A Model-Driven Generation Approach for Web Applications. In: Gaedke, M., Grossniklaus, M., Díaz, O. (eds.) ICWE 2009. LNCS, vol. 5648, pp. 493-496. Springer, Heidelberg (2009).
-
(2009)
ICWE 2009. LNCS
, vol.5648
, pp. 493-496
-
-
Kroiss, C.1
Koch, N.2
Knapp, A.3
-
21
-
-
85067740744
-
-
XPand
-
Eclipse: XPand (2013), http://wiki.eclipse.org/Xpand.
-
(2013)
-
-
-
22
-
-
85067768763
-
-
eXtensible Access Control Markup Language (XACML) Version 2.0
-
OASIS: eXtensible Access Control Markup Language (XACML) Version 2.0 (2005), http://docs.oasis-open.org/xacml/2.0/access control-xacml-2.0-core-spec-os.pdf.
-
(2005)
-
-
-
24
-
-
84873845646
-
Towards model-driven development of access control policies for web applications
-
Busch, M., Koch, N., Masi, M., Pugliese, R., Tiezzi, F.: Towards model-driven development of access control policies for web applications. In: Model-Driven Security Workshop in Conjunction with MoDELS 2012. ACM Digital Library (2012).
-
(2012)
Model-Driven Security Workshop in Conjunction with Models 2012. ACM Digital Library
-
-
Busch, M.1
Koch, N.2
Masi, M.3
Pugliese, R.4
Tiezzi, F.5
-
25
-
-
84857328430
-
Formalisation and Implementation of the XACML Access Control Mechanism
-
In: Barthe, G., Livshits, B., Scandariato, R. (eds.), Springer, Heidelberg
-
Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and Implementation of the XACML Access Control Mechanism. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 60-74. Springer, Heidelberg (2012).
-
(2012)
Essos 2012. LNCS
, vol.7159
, pp. 60-74
-
-
Masi, M.1
Pugliese, R.2
Tiezzi, F.3
-
27
-
-
84924945137
-
OpenNode. Open Architecture for Secondary Nodes of the Electricity SmartGrid
-
Soriano, R., Alberto, M., Collazo, J., Gonzales, I., Kupzo, F., Moreno, L., Lugmaier, A., Lorenzo, J.: OpenNode. Open Architecture for Secondary Nodes of the Electricity SmartGrid. In: 21st International Conference on Electricity Distribution (2011).
-
(2011)
21St International Conference on Electricity Distribution
-
-
Soriano, R.1
Alberto, M.2
Collazo, J.3
Gonzales, I.4
Kupzo, F.5
Moreno, L.6
Lugmaier, A.7
Lorenzo, J.8
-
29
-
-
84927612152
-
A threat analysis methodology for smart home scenarios
-
Springer
-
Beckers, K., Fabender, S., Heisel, M., Suppan, S.: A threat analysis methodology for smart home scenarios. In: SmartGridSec 2014. LNCS. Springer (2014).
-
(2014)
Smartgridsec 2014. LNCS
-
-
Beckers, K.1
Fabender, S.2
Heisel, M.3
Suppan, S.4
-
30
-
-
85067773587
-
-
Website security statistics report. Technical report, WhiteHat Security
-
Grossman, J.: Website security statistics report. Technical report, WhiteHat Security (2013), https://www.whitehatsec.com/resource/stats.html.
-
(2013)
-
-
Grossman, J.1
-
31
-
-
84908163748
-
Secure Web Engineering supported by an Evaluation Framework
-
Busch, M.: Secure Web Engineering supported by an Evaluation Framework. In: Modelsward 2014. Scitepress (2014).
-
(2014)
Modelsward 2014. Scitepress
-
-
Busch, M.1
-
33
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002).
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
34
-
-
79952860136
-
UACML: Unified Access Control Modeling Language
-
Slimani, N., Khambhammettu, H., Adi, K., Logrippo, L.: UACML: Unified Access Control Modeling Language. In: NTMS 2011, pp. 1-8 (2011).
-
(2011)
NTMS 201
, pp. 1-8
-
-
Slimani, N.1
Khambhammettu, H.2
Adi, K.3
Logrippo, L.4
-
36
-
-
79959767827
-
Nonfunctional Properties in the Model-Driven Development of Service-Oriented Systems
-
Gilmore, S., Gönczy, L., Koch, N., Mayer, P., Tribastone, M., Varró, D.: Nonfunctional Properties in the Model-Driven Development of Service-Oriented Systems. J. Softw. Syst. Model. 10(3), 287-311 (2011).
-
(2011)
J. Softw. Syst. Model
, vol.10
, Issue.3
, pp. 287-311
-
-
Gilmore, S.1
Gönczy, L.2
Koch, N.3
Mayer, P.4
Tribastone, M.5
Varró, D.6
|