-
1
-
-
78650715365
-
Model-driven configuration of SELinux policies
-
5871. Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
B. Agreiter and R. Breu. "Model-Driven Configuration of SELinux Policies". In: On the Move to Meaningful Internet Systems: OTM 2009. Vol. 5871. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009, pp. 887-904.
-
(2009)
On the Move to Meaningful Internet Systems: OTM 2009
, pp. 887-904
-
-
Agreiter, B.1
Breu, R.2
-
7
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Jan.
-
D. Basin, J. Doser, and T. Lodderstedt. "Model driven security: From UML models to access control infrastructures". In: ACM Trans. Softw. Eng. Methodol. 15.1 (Jan. 2006), pp. 39-91.
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
8
-
-
38049059202
-
A metamodel-based approach for analyzing security-design models
-
Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
D. Basin et al. "A Metamodel-Based Approach for Analyzing Security-Design Models". In: Model Driven Engineering Languages and Systems. Vol. 4735. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007, pp. 420-435.
-
(2007)
Model Driven Engineering Languages and Systems.
, vol.4735
, pp. 420-435
-
-
Basin, D.1
-
10
-
-
33750045718
-
Model driven engineering: An emerging technical space
-
J. Bezivin. "Model Driven Engineering: An Emerging Technical Space". In: GTTSE, pp.36-64 (2006).
-
(2006)
GTTSE
, pp. 36-64
-
-
Bezivin, J.1
-
12
-
-
84994715673
-
Model-driven security engineering of service oriented systems
-
Lecture Notes in Business Information Processing. Springer Berlin Heidelberg
-
R. Breu et al. "Model-Driven Security Engineering of Service Oriented Systems". English. In: Information Systems and e-Business Technologies. Vol. 5. Lecture Notes in Business Information Processing. Springer Berlin Heidelberg, 2008, pp. 59-71.
-
(2008)
Information Systems and E-Business Technologies.
, vol.5
, pp. 59-71
-
-
Breu, R.1
-
13
-
-
33750286091
-
A model transformation semantics and analysis methodology for SecureUML
-
Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
A. Brucker, J. Doser, and B. Wolff. "A Model Transformation Semantics and Analysis Methodology for SecureUML". In: Model Driven Engineering Languages and Systems. Vol. 4199. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 306-320.
-
(2006)
Model Driven Engineering Languages and Systems
, vol.4199
, pp. 306-320
-
-
Brucker, A.1
Doser, J.2
Wolff, B.3
-
14
-
-
42049101982
-
An analysis of research topics in software engineering-2006
-
Agile Product Line Engineering
-
K.-Y. Cai and D. Card. "An analysis of research topics in software engineering-2006". In: Journal of Systems and Software 81.6 (2008). Agile Product Line Engineering, pp. 1051-1058.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.6
, pp. 1051-1058
-
-
Cai, K.-Y.1
Card, D.2
-
15
-
-
70349862227
-
Model-driven security in practice: An industrial experience
-
Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
M. Clavel et al. "Model-Driven Security in Practice: An Industrial Experience". In: Model Driven Architecture-Foundations and Applications. Vol. 5095. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008, pp. 326-337.
-
(2008)
Model Driven Architecture-Foundations and Applications
, vol.5095
, pp. 326-337
-
-
Clavel, M.1
-
17
-
-
79953186499
-
Systematic development of UMLsec design models based on security requirements
-
Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
D. Hatebur et al. "Systematic Development of UMLsec Design Models Based on Security Requirements". In: Fundamental Approaches to Software Engineering. Vol. 6603. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011, pp. 232-246
-
(2011)
Fundamental Approaches to Software Engineering
, vol.6603
, pp. 232-246
-
-
Hatebur, D.1
-
18
-
-
84944688537
-
Developing secure networked Web-based systems using model-based risk assessment and UMLsec
-
S. Houmb and J. Jürjens. "Developing secure networked Web-based systems using model-based risk assessment and UMLsec". In: Tenth Asia-Pacific Software Engineering Conference, 2003. 2003, pp. 488-497.
-
(2003)
Tenth Asia-Pacific Software Engineering Conference, 2003
, pp. 488-497
-
-
Houmb, S.1
Jürjens, J.2
-
21
-
-
33749391615
-
Model-based security engineering for real
-
J. Jürjens. "Model-based security engineering for real". In: FM 2006: Formal Methods (2006), pp. 600-606.
-
(2006)
FM 2006: Formal Methods
, pp. 600-606
-
-
Jürjens, J.1
-
25
-
-
0036818278
-
A synthesis of evaluation criteria for software specifications and specification techniques
-
A. A. Khwaja and J. E. Urban. "A Synthesis of Evaluation Criteria for Software Specifications and Specification Techniques". In: International Journal of Software Engineering and Knowledge Engineering 12.05 (2002), pp. 581-599. eprint: http://www.worldscientific.com/doi/pdf/10.1142/S0218194002001062.
-
(2002)
International Journal of Software Engineering and Knowledge Engineering
, vol.12
, Issue.5
, pp. 581-599
-
-
Khwaja, A.A.1
Urban, J.E.2
-
27
-
-
44649122227
-
Guidelines for performing systematic literature reviews in software engineering
-
B. Kitchenham. "Guidelines for performing systematic literature reviews in software engineering". In: EBSE Technical Report (2007).
-
(2007)
EBSE Technical Report
-
-
Kitchenham, B.1
-
28
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
T. Lodderstedt, D. Basin, and J. Doser. "SecureUML: A UML-Based Modeling Language for Model-Driven Security". English. In: «UML»2002-The Unified Modeling Language. Vol. 2460. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2002, pp. 426-441
-
(2002)
«uML»2002-The Unified Modeling Language
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
30
-
-
84936852407
-
Modeling security critical SOA applications
-
Springer Berlin Heidelberg
-
"Modeling Security Critical SOA Applications". English. In: Security Engineering for Service-Oriented Architectures. Springer Berlin Heidelberg, 2009, pp. 93-119.
-
(2009)
Security Engineering for Service-Oriented Architectures
, pp. 93-119
-
-
-
37
-
-
75449109427
-
Model-driven development for early aspects
-
P. Sánchez et al. "Model-driven development for early aspects". In: Information and Software Technology 52.3 (2010), pp. 249-273.
-
(2010)
Information and Software Technology
, vol.52
, Issue.3
, pp. 249-273
-
-
Sánchez, P.1
-
38
-
-
69949118455
-
Designing secure data warehouses by using MDA and QVT
-
E. Soler et al. "Designing Secure Data Warehouses by Using MDA and QVT". In: J. UCS 15.8 (2009), pp. 1607-1641.
-
(2009)
J. UCS
, vol.15
, Issue.8
, pp. 1607-1641
-
-
Soler, E.1
-
42
-
-
33745878813
-
Using UML packages for designing secure data warehouses
-
Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
R. Villarroel et al. "Using UML Packages for Designing Secure Data Warehouses". In: Computational Science and Its Applications-ICCSA 2006. Vol. 3982. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 1024-1034.
-
(2006)
Computational Science and Its Applications-ICCSA 2006
, vol.3982
, pp. 1024-1034
-
-
Villarroel, R.1
-
43
-
-
84876283132
-
Systematic literature reviews in software engineering
-
C. Wohlin and R. Prikladnicki. "Systematic literature reviews in software engineering". In: Information and Software Technology 55.6 (2013), pp. 919-920.
-
(2013)
Information and Software Technology
, vol.55
, Issue.6
, pp. 919-920
-
-
Wohlin, C.1
Prikladnicki, R.2
|