메뉴 건너뛰기




Volumn 1, Issue , 2013, Pages 432-441

A systematic review of model-driven security

Author keywords

Model; Model transformations; Model driven security model driven; Security; Survey; Systematic review

Indexed keywords

MODELS; SOFTWARE ENGINEERING; SURVEYING;

EID: 84936886921     PISSN: 15301362     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APSEC.2013.64     Document Type: Conference Paper
Times cited : (19)

References (43)
  • 1
    • 78650715365 scopus 로고    scopus 로고
    • Model-driven configuration of SELinux policies
    • 5871. Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • B. Agreiter and R. Breu. "Model-Driven Configuration of SELinux Policies". In: On the Move to Meaningful Internet Systems: OTM 2009. Vol. 5871. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009, pp. 887-904.
    • (2009) On the Move to Meaningful Internet Systems: OTM 2009 , pp. 887-904
    • Agreiter, B.1    Breu, R.2
  • 7
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Jan.
    • D. Basin, J. Doser, and T. Lodderstedt. "Model driven security: From UML models to access control infrastructures". In: ACM Trans. Softw. Eng. Methodol. 15.1 (Jan. 2006), pp. 39-91.
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 8
    • 38049059202 scopus 로고    scopus 로고
    • A metamodel-based approach for analyzing security-design models
    • Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • D. Basin et al. "A Metamodel-Based Approach for Analyzing Security-Design Models". In: Model Driven Engineering Languages and Systems. Vol. 4735. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007, pp. 420-435.
    • (2007) Model Driven Engineering Languages and Systems. , vol.4735 , pp. 420-435
    • Basin, D.1
  • 10
    • 33750045718 scopus 로고    scopus 로고
    • Model driven engineering: An emerging technical space
    • J. Bezivin. "Model Driven Engineering: An Emerging Technical Space". In: GTTSE, pp.36-64 (2006).
    • (2006) GTTSE , pp. 36-64
    • Bezivin, J.1
  • 12
    • 84994715673 scopus 로고    scopus 로고
    • Model-driven security engineering of service oriented systems
    • Lecture Notes in Business Information Processing. Springer Berlin Heidelberg
    • R. Breu et al. "Model-Driven Security Engineering of Service Oriented Systems". English. In: Information Systems and e-Business Technologies. Vol. 5. Lecture Notes in Business Information Processing. Springer Berlin Heidelberg, 2008, pp. 59-71.
    • (2008) Information Systems and E-Business Technologies. , vol.5 , pp. 59-71
    • Breu, R.1
  • 13
    • 33750286091 scopus 로고    scopus 로고
    • A model transformation semantics and analysis methodology for SecureUML
    • Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • A. Brucker, J. Doser, and B. Wolff. "A Model Transformation Semantics and Analysis Methodology for SecureUML". In: Model Driven Engineering Languages and Systems. Vol. 4199. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 306-320.
    • (2006) Model Driven Engineering Languages and Systems , vol.4199 , pp. 306-320
    • Brucker, A.1    Doser, J.2    Wolff, B.3
  • 14
    • 42049101982 scopus 로고    scopus 로고
    • An analysis of research topics in software engineering-2006
    • Agile Product Line Engineering
    • K.-Y. Cai and D. Card. "An analysis of research topics in software engineering-2006". In: Journal of Systems and Software 81.6 (2008). Agile Product Line Engineering, pp. 1051-1058.
    • (2008) Journal of Systems and Software , vol.81 , Issue.6 , pp. 1051-1058
    • Cai, K.-Y.1    Card, D.2
  • 15
    • 70349862227 scopus 로고    scopus 로고
    • Model-driven security in practice: An industrial experience
    • Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • M. Clavel et al. "Model-Driven Security in Practice: An Industrial Experience". In: Model Driven Architecture-Foundations and Applications. Vol. 5095. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008, pp. 326-337.
    • (2008) Model Driven Architecture-Foundations and Applications , vol.5095 , pp. 326-337
    • Clavel, M.1
  • 17
    • 79953186499 scopus 로고    scopus 로고
    • Systematic development of UMLsec design models based on security requirements
    • Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • D. Hatebur et al. "Systematic Development of UMLsec Design Models Based on Security Requirements". In: Fundamental Approaches to Software Engineering. Vol. 6603. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011, pp. 232-246
    • (2011) Fundamental Approaches to Software Engineering , vol.6603 , pp. 232-246
    • Hatebur, D.1
  • 18
    • 84944688537 scopus 로고    scopus 로고
    • Developing secure networked Web-based systems using model-based risk assessment and UMLsec
    • S. Houmb and J. Jürjens. "Developing secure networked Web-based systems using model-based risk assessment and UMLsec". In: Tenth Asia-Pacific Software Engineering Conference, 2003. 2003, pp. 488-497.
    • (2003) Tenth Asia-Pacific Software Engineering Conference, 2003 , pp. 488-497
    • Houmb, S.1    Jürjens, J.2
  • 21
    • 33749391615 scopus 로고    scopus 로고
    • Model-based security engineering for real
    • J. Jürjens. "Model-based security engineering for real". In: FM 2006: Formal Methods (2006), pp. 600-606.
    • (2006) FM 2006: Formal Methods , pp. 600-606
    • Jürjens, J.1
  • 25
    • 0036818278 scopus 로고    scopus 로고
    • A synthesis of evaluation criteria for software specifications and specification techniques
    • A. A. Khwaja and J. E. Urban. "A Synthesis of Evaluation Criteria for Software Specifications and Specification Techniques". In: International Journal of Software Engineering and Knowledge Engineering 12.05 (2002), pp. 581-599. eprint: http://www.worldscientific.com/doi/pdf/10.1142/S0218194002001062.
    • (2002) International Journal of Software Engineering and Knowledge Engineering , vol.12 , Issue.5 , pp. 581-599
    • Khwaja, A.A.1    Urban, J.E.2
  • 27
    • 44649122227 scopus 로고    scopus 로고
    • Guidelines for performing systematic literature reviews in software engineering
    • B. Kitchenham. "Guidelines for performing systematic literature reviews in software engineering". In: EBSE Technical Report (2007).
    • (2007) EBSE Technical Report
    • Kitchenham, B.1
  • 28
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • T. Lodderstedt, D. Basin, and J. Doser. "SecureUML: A UML-Based Modeling Language for Model-Driven Security". English. In: «UML»2002-The Unified Modeling Language. Vol. 2460. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2002, pp. 426-441
    • (2002) «uML»2002-The Unified Modeling Language , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 30
    • 84936852407 scopus 로고    scopus 로고
    • Modeling security critical SOA applications
    • Springer Berlin Heidelberg
    • "Modeling Security Critical SOA Applications". English. In: Security Engineering for Service-Oriented Architectures. Springer Berlin Heidelberg, 2009, pp. 93-119.
    • (2009) Security Engineering for Service-Oriented Architectures , pp. 93-119
  • 37
    • 75449109427 scopus 로고    scopus 로고
    • Model-driven development for early aspects
    • P. Sánchez et al. "Model-driven development for early aspects". In: Information and Software Technology 52.3 (2010), pp. 249-273.
    • (2010) Information and Software Technology , vol.52 , Issue.3 , pp. 249-273
    • Sánchez, P.1
  • 38
    • 69949118455 scopus 로고    scopus 로고
    • Designing secure data warehouses by using MDA and QVT
    • E. Soler et al. "Designing Secure Data Warehouses by Using MDA and QVT". In: J. UCS 15.8 (2009), pp. 1607-1641.
    • (2009) J. UCS , vol.15 , Issue.8 , pp. 1607-1641
    • Soler, E.1
  • 42
    • 33745878813 scopus 로고    scopus 로고
    • Using UML packages for designing secure data warehouses
    • Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • R. Villarroel et al. "Using UML Packages for Designing Secure Data Warehouses". In: Computational Science and Its Applications-ICCSA 2006. Vol. 3982. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, pp. 1024-1034.
    • (2006) Computational Science and Its Applications-ICCSA 2006 , vol.3982 , pp. 1024-1034
    • Villarroel, R.1
  • 43
    • 84876283132 scopus 로고    scopus 로고
    • Systematic literature reviews in software engineering
    • C. Wohlin and R. Prikladnicki. "Systematic literature reviews in software engineering". In: Information and Software Technology 55.6 (2013), pp. 919-920.
    • (2013) Information and Software Technology , vol.55 , Issue.6 , pp. 919-920
    • Wohlin, C.1    Prikladnicki, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.