-
1
-
-
34548178043
-
A novel approach to building secure systems
-
Reliability and Security (ARES). April
-
D. Vidakovic and D. Simic, "A Novel Approach to Building Secure Systems", in the Second International Conference on Availability, Reliability and Security (ARES), April 2007, pp. 1074-1084
-
(2007)
The Second International Conference on Availability
, pp. 1074-1084
-
-
Vidakovic, D.1
Simic, D.2
-
2
-
-
79955143136
-
SecureUML: A uml-based modeling language for model-driven security
-
London, UK
-
T. Lodderstedt, D. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security", in Proceedings of the 5th International Conference on the Unified Modeling Language, London, UK, 2002, pp. 426-441
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
3
-
-
79955163100
-
-
UML 2002-The Unified Modeling Language, J.-M. Jezequel, H. Hussmann and S. Cook, Ed, Springer Berlin Heidelberg
-
J. Jlirjens, "UMLsec: Extending UML for Secure Systems Development", in UML 2002-The Unified Modeling Language, J.-M. Jezequel, H. Hussmann and S. Cook, Ed. Springer Berlin Heidelberg, 2002, pp. 412-425
-
(2002)
UMLsec: Extending UML for Secure Systems Development
, pp. 412-425
-
-
Jlirjens, J.1
-
4
-
-
84892399582
-
-
The 8th International Conference on Availability, Reliability and Security (ARES), September 2013
-
D. Munante, J. Gallon and P. Aniorte, "An Approach Based on ModelDriven Engineering to Define Security Policies Using OrBAC", in the 8th International Conference on Availability, Reliability and Security (ARES), September 2013, pp. 324-332
-
An Approach Based on ModelDriven Engineering to Define Security Policies Using OrBAC
, pp. 324-332
-
-
Munante, D.1
Gallon, J.2
Aniorte, P.3
-
5
-
-
77952407814
-
Organization based access control
-
June
-
A. A. E. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel and G. Trouessin, "Organization based access control", in IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY), June 2003, pp. 120-131
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 120-131
-
-
Kalam, A.A.E.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
6
-
-
71949097552
-
PolyOrBAC: A security framework for Critical Infrastructures
-
December
-
A. A. EI Kalam, Y. Deswarte, A. Barna, and M. Kaiinich, "PolyOrBAC: A security framework for Critical Infrastructures", International Journal of Critical. Infrastructures Protection, vol. 2, n 4, december 2009, pp. 154-169
-
(2009)
International Journal of Critical. Infrastructures Protection
, vol.2
, Issue.4
, pp. 154-169
-
-
Kalam, A.A.E.I.1
Deswarte, Y.2
Barna, A.3
Kaiinich, M.4
-
8
-
-
46849103389
-
Access control for collaborative systems: A web services based approach
-
July
-
A. A. EI Kalam, Y. Deswarte, A. Baina and M. Kaaniche, "Access Control for Collaborative Systems: A Web Services Based Approach", in IEEE International Conference on Web Services (JCWS), July 2007, pp. I064-1071
-
(2007)
IEEE International Conference on Web Services (JCWS)
, pp. I064-1071
-
-
Kalam, A.A.E.I.1
Deswarte, Y.2
Baina, A.3
Kaaniche, M.4
-
9
-
-
33750960661
-
Model driven security
-
Reliability and Security, Washington, DC, USA
-
D. Basin, "Model Driven Security", in Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, 2006, pp. 4
-
(2006)
Proceedings of the First International Conference on Availability
, pp. 4
-
-
Basin, D.1
-
10
-
-
58049169429
-
Model driven security
-
M. Broy, J. Grlinbauer, D. Harel and T. Hoare, Ed Springer Netherlands
-
D. Basin, J. Doser and T. Lodderstedt, "Model Driven Security", in Engineering Theories of Software Intensive Systems, vol. 195, M. Broy, J. Grlinbauer, D. Harel and T. Hoare, Ed. Springer Netherlands, 2005, pp. 353-398
-
(2005)
Engineering Theories of Software Intensive Systems
, vol.195
, pp. 353-398
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
11
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
January
-
D. Basin, J. Doser and T. Lodderstedt, "Model driven security: From UML models to access control infrastructures", ACM Transactions on Software Engineering and Methodology, vol. 15, nO I, January 2006, pp. 39-91
-
(2006)
ACM Transactions on Software Engineering and Methodology
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
12
-
-
79960151725
-
A decade of model-driven security
-
New York, USA
-
D. Basin, M. Clavel and M. Egea, "A decade of model-driven security", in Proceedings of the 16th ACM symposium on Access control models and technologies, New York, USA, 2011, pp. 1-10
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
-
14
-
-
84928715240
-
-
Unified Modeling Language
-
"Unified Modeling Language http://www.uml.org/. UML". Available on:
-
-
-
-
15
-
-
74549142762
-
-
2nd Edition, Addison-Wesley Professional. Part of the Eclipse Series, December
-
D. Steinberg, F. Budinsky, M. Paternostro and E. Merks, "EMF: Eclipse Modeling Framework", 2nd Edition, Addison-Wesley Professional. Part of the Eclipse Series, December 2008
-
(2008)
EMF: Eclipse Modeling Framework
-
-
Steinberg, D.1
Budinsky, F.2
Paternostro, M.3
Merks, E.4
-
16
-
-
0028513932
-
Access control: Principle and practice
-
September
-
R. S. Sandhuet and P. Samarati, "Access control: principle and practice", IEEE Commun. Mag., vol. 32, nO 9, September 1994, pp. 40-48
-
(1994)
IEEE Commun. Mag
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhuet, R.S.1
Samarati, P.2
-
17
-
-
0030086382
-
Role-based access control models
-
February
-
S. Sandhu, E. J. Coyne, H. J. Feinstein and C. E. Youman, "Role-Based Access Control Models", Computer, vol. 29, nO 2, February 1996, pp. 38-47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, S.1
Coyne, E.J.2
Feinstein, H.J.3
Youman, C.E.4
-
19
-
-
84928722126
-
-
Object Management
-
"Object Management http://www.omg.org/. Group-OMG". Available on:
-
-
-
-
20
-
-
84928724281
-
-
MetaObject Facility-MOF
-
"MetaObject Facility-MOF". Available on: http://www.omg.org/mof/
-
-
-
-
21
-
-
84928710762
-
-
Extensible Markup Language (XML) 1.0 (Fifth Edition)
-
"Extensible Markup Language (XML) 1.0 (Fifth Edition)". Available on: http://www.w3.org/TRlREC-xml/
-
-
-
-
22
-
-
84928752219
-
-
XML Metadata Interchange (XMI) 2.4.1
-
"XML Metadata Interchange (XMI) 2.4.1". Available on: http://www.omg.org/spec/XMII2.4.I/
-
-
-
-
23
-
-
84928728141
-
Xml metadata interchange
-
J. LlU and M. T. OZSU, Ed, Springer US
-
M. Weiss, "XML Metadata Interchange", in Encyclopedia of Database Systems, J. LlU and M. T. OZSU, Ed. Springer US, 2009, pp. 3597
-
(2009)
Encyclopedia of Database Systems
, pp. 3597
-
-
Weiss, M.1
-
24
-
-
84855764719
-
Critical infrastructure security modelling and resci-monitor: A risk based critical infrastructure model
-
May
-
T. Schaberreiter, J. Aubert and D. Khadraoui, "Critical infrastructure security modelling and RESCI-MONITOR: A risk based critical infrastructure model", in 1ST-Africa Conference Proceedings, May 2011, pp. 1-8
-
(2011)
1ST-Africa Conference Proceedings
, pp. 1-8
-
-
Schaberreiter, T.1
Aubert, J.2
Khadraoui, D.3
-
25
-
-
42549114684
-
Enhancing the reliability and security of the information infrastructure used to manage the power system
-
June
-
F. Cleveland, "Enhancing the Reliability and Security of the Information Infrastructure Used to Manage the Power System", in IEEE Power Engineering Society General Meeting, June 2007, pp. 1-8.
-
(2007)
IEEE Power Engineering Society General Meeting
, pp. 1-8
-
-
Cleveland, F.1
|