-
1
-
-
84859434803
-
A methodology for integrating access control policies within database development
-
J. Abramov, O. Anson, M. Dahan, P. Shoval, and A. Sturm A methodology for integrating access control policies within database development Comput. Secur. 31 3 2012 299 314 10.1016/j.cose.2012.01.004
-
(2012)
Comput. Secur.
, vol.31
, Issue.3
, pp. 299-314
-
-
Abramov, J.1
Anson, O.2
Dahan, M.3
Shoval, P.4
Sturm, A.5
-
3
-
-
84861955129
-
Evaluation of the pattern-based method for secure development (PbSD): A controlled experiment
-
J. Abramov, A. Sturm, and P. Shoval Evaluation of the pattern-based method for secure development (PbSD): a controlled experiment Inf. Softw. Technol. 54 9 2012 1029 1043 10.1016/j.infsof.2012.04.001
-
(2012)
Inf. Softw. Technol.
, vol.54
, Issue.9
, pp. 1029-1043
-
-
Abramov, J.1
Sturm, A.2
Shoval, P.3
-
5
-
-
38149075083
-
Model driven security engineering for the realization of dynamic security requirements in collaborative systems
-
M. Alam Model driven security engineering for the realization of dynamic security requirements in collaborative systems Models Softw. Eng. 4364 2007 278 287 10.1007/978-3-540-69489-2-34
-
(2007)
Models Softw. Eng.
, vol.4364
, pp. 278-287
-
-
Alam, M.1
-
7
-
-
33750940982
-
Modeling permissions in a (U/X) ML world
-
M. Alam, R. Breu, and M. Hafner Modeling permissions in a (U/X) ML world Proceedings of International Conference on Availability, Reliability and Security, ARES vol. 8 2006 692 10.1109/ARES.2006.84
-
(2006)
Proceedings of International Conference on Availability, Reliability and Security, ARES
, vol.8
, pp. 692
-
-
Alam, M.1
Breu, R.2
Hafner, M.3
-
12
-
-
84898843700
-
Adaptable, model-driven security engineering for SaaS cloud-based applications
-
M. Almorsy, J. Grundy, and A.S. Ibrahim Adaptable, model-driven security engineering for SaaS cloud-based applications Autom. Softw. Eng. 21 2 2013 187 224 10.1007/s10515-013-0133-z
-
(2013)
Autom. Softw. Eng.
, vol.21
, Issue.2
, pp. 187-224
-
-
Almorsy, M.1
Grundy, J.2
Ibrahim, A.S.3
-
13
-
-
38049059202
-
A metamodel-based approach for analyzing security-design models
-
G. Engels, B. Opdyke, D. Schmidt, F. Weil, Volume 4735 of Lecture Notes in Computer Science Springer Berlin, Heidelberg
-
D. Basin, M. Clavel, J. Doser, and M. Egea A metamodel-based approach for analyzing security-design models G. Engels, B. Opdyke, D. Schmidt, F. Weil, Model Driven Engineering Languages and Systems Volume 4735 of Lecture Notes in Computer Science 2007 Springer Berlin, Heidelberg 420 435 10.1007/978-3-540-75209-7-29
-
(2007)
Model Driven Engineering Languages and Systems
, pp. 420-435
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
14
-
-
60849104397
-
Automated analysis of security-design models
-
D. Basin, M. Clavel, J. Doser, and M. Egea Automated analysis of security-design models Inf. Softw. Technol. 51 5 2009 815 831 10.1016/j.infsof.2008.05.011
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
15
-
-
79960151725
-
A decade of model-driven security
-
ACM New York, NY, USA
-
D. Basin, M. Clavel, and M. Egea A decade of model-driven security Proceedings of the 16th ACM symposium on Access Control Models and Technologies, SACMAT'11 2011 ACM New York, NY, USA 1 10 10.1145/1998441.1998443
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT'11
, pp. 1-10
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
-
16
-
-
84857748057
-
Model-driven development of security-aware GUIs for data-centric applications
-
Springer Berlin Heidelberg
-
D. Basin, M. Clavel, and M. Egea Model-driven development of security-aware GUIs for data-centric applications Foundations of Security Analysis and Design VI 2011 Springer Berlin Heidelberg 101 124
-
(2011)
Foundations of Security Analysis and Design VI
, pp. 101-124
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
-
17
-
-
84900546483
-
A model-driven methodology for developing secure data-management applications
-
D. Basin, M. Clavel, M. Egea, M.A.G. de Dios, and C. Dania A model-driven methodology for developing secure data-management applications IEEE Trans. Softw. Eng. 40 4 2014 324 337
-
(2014)
IEEE Trans. Softw. Eng.
, vol.40
, Issue.4
, pp. 324-337
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
De Dios, M.A.G.4
Dania, C.5
-
19
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt Model driven security: from UML models to access control infrastructures ACM Trans. Softw. Eng. Methodol. 15 2006 39 91 10.1145/1125808.1125810
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
20
-
-
84925010520
-
A toolchain for designing and testing access control policies
-
Springer
-
A. Bertolino, M. Busch, S. Daoudagh, F. Lonetti, and E. Marchetti A toolchain for designing and testing access control policies Engineering Secure Future Internet Services and Systems 2014 Springer 266 286
-
(2014)
Engineering Secure Future Internet Services and Systems
, pp. 266-286
-
-
Bertolino, A.1
Busch, M.2
Daoudagh, S.3
Lonetti, F.4
Marchetti, E.5
-
24
-
-
68049118693
-
Applying QVT in order to implement secure data warehouses in SQL server analysis services
-
C. Blanco Applying QVT in order to implement secure data warehouses in SQL server analysis services J. Res. Pract. Inf. Technol. 41 2 2009 135
-
(2009)
J. Res. Pract. Inf. Technol.
, vol.41
, Issue.2
, pp. 135
-
-
Blanco, C.1
-
25
-
-
84942645909
-
Modernizing secure OLAP applications with a model-driven approach
-
C. Blanco, E. Fernandez-Medina, and J. Trujillo Modernizing secure OLAP applications with a model-driven approach Comput. J. 2014 10.1093/comjnl/bxu070
-
(2014)
Comput. J.
-
-
Blanco, C.1
Fernandez-Medina, E.2
Trujillo, J.3
-
26
-
-
84897040963
-
Showing the benefits of applying a model driven architecture for developing secure OLAP applications
-
C. Blanco, and I. de Guzmán Showing the benefits of applying a model driven architecture for developing secure OLAP applications. J. UCS 20 2 2014 79 106
-
(2014)
J. UCS
, vol.20
, Issue.2
, pp. 79-106
-
-
Blanco, C.1
De Guzmán, I.2
-
30
-
-
79959698716
-
A transformation contract to generate aspects from access control policies
-
C. Braga A transformation contract to generate aspects from access control policies Softw. Syst. Model. 10 3 2011 395 409 10.1007/s10270-010-0156-x
-
(2011)
Softw. Syst. Model.
, vol.10
, Issue.3
, pp. 395-409
-
-
Braga, C.1
-
31
-
-
84880445741
-
Model-Driven Software Engineering in Practice
-
1st edition Morgan & Claypool Publishers
-
M. Brambilla, J. Cabot, and M. Wimmer Model-Driven Software Engineering in Practice 1st edition Synthesis Lectures on Software Engineering 2012 Morgan & Claypool Publishers http://dx.doi.org/10.2200/S00441ED1V01Y201208SWE001
-
(2012)
Synthesis Lectures on Software Engineering
-
-
Brambilla, M.1
Cabot, J.2
Wimmer, M.3
-
32
-
-
84994715673
-
Model-driven security engineering of service oriented systems
-
Lecture Notes in Business Information Processing Springer Berlin, Heidelberg
-
R. Breu, M. Hafner, F. Innerhofer-Oberperfler, and F. Wozak Model-driven security engineering of service oriented systems Information Systems and e-Business Technologies Lecture Notes in Business Information Processing 2008 Springer Berlin, Heidelberg 59 71
-
(2008)
Information Systems and E-Business Technologies
, pp. 59-71
-
-
Breu, R.1
Hafner, M.2
Innerhofer-Oberperfler, F.3
Wozak, F.4
-
33
-
-
26844470176
-
Model driven security for inter-organizational workflows in e-government
-
Springer Berlin Heidelberg
-
R. Breu, M. Hafner, B. Weber, and A. Novak Model driven security for inter-organizational workflows in e-government E-Government: Towards Electronic Democracy 2005 Springer Berlin Heidelberg 122 133
-
(2005)
E-Government: Towards Electronic Democracy
, pp. 122-133
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
Novak, A.4
-
35
-
-
33750286091
-
A model transformation semantics and analysis methodology for SecureUML
-
Springer Berlin, Heidelberg
-
A. Brucker, J. Doser, and B. Wolff A model transformation semantics and analysis methodology for SecureUML Lecture Notes in Computer Science 2006 Springer Berlin, Heidelberg 306 320
-
(2006)
Lecture Notes in Computer Science
, pp. 306-320
-
-
Brucker, A.1
Doser, J.2
Wolff, B.3
-
38
-
-
70349862227
-
Model-driven security in practice: An industrial experience
-
Lecture Notes in Computer Science Springer Berlin, Heidelberg
-
M. Clavel, V. Silva, C. Braga, and M. Egea Model-driven security in practice: an industrial experience Model Driven Architecture - Foundations and Applications Lecture Notes in Computer Science 2008 Springer Berlin, Heidelberg 326 337
-
(2008)
Model Driven Architecture - Foundations and Applications
, pp. 326-337
-
-
Clavel, M.1
Silva, V.2
Braga, C.3
Egea, M.4
-
39
-
-
80053615106
-
A classification framework for software component models
-
I. Crnkovic, S. Sentilles, A. Vulgarakis, and M.R. Chaudron A classification framework for software component models IEEE Trans. Softw. Eng. 37 5 2011 593 615
-
(2011)
IEEE Trans. Softw. Eng.
, vol.37
, Issue.5
, pp. 593-615
-
-
Crnkovic, I.1
Sentilles, S.2
Vulgarakis, A.3
Chaudron, M.R.4
-
46
-
-
34247643088
-
Developing secure data warehouses with a UML extension
-
E. Fernández-Medina, J. Trujillo, R. Villarroel, and M. Piattini Developing secure data warehouses with a UML extension Inf. Syst. 32 6 2006 826 856 10.1016/j.is.2006.07.003
-
(2006)
Inf. Syst.
, vol.32
, Issue.6
, pp. 826-856
-
-
Fernández-Medina, E.1
Trujillo, J.2
Villarroel, R.3
Piattini, M.4
-
47
-
-
29244463832
-
An MDA approach to access control specifications using MOF and UML profiles
-
T. Fink, M. Koch, and K. Pauls An MDA approach to access control specifications using MOF and UML profiles Electron. Notes Theor. Comput. Sci. 142 2006 161 179 10.1016/j.entcs.2004.12.045
-
(2006)
Electron. Notes Theor. Comput. Sci.
, vol.142
, pp. 161-179
-
-
Fink, T.1
Koch, M.2
Pauls, K.3
-
50
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S.H. Houmb An aspect-oriented methodology for designing secure applications Inf. Softw. Technol. 51 5 2009 846 864 10.1016/j.infsof.2008.05.004
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
51
-
-
79959767827
-
Non-functional properties in the model-driven development of service-oriented systems
-
S. Gilmore, L. Gönczy, N. Koch, P. Mayer, M. Tribastone, and D. Varró Non-functional properties in the model-driven development of service-oriented systems Softw. Syst. Model. 10 3 2010 287 311 10.1007/s10270-010-0155-y
-
(2010)
Softw. Syst. Model.
, vol.10
, Issue.3
, pp. 287-311
-
-
Gilmore, S.1
Gönczy, L.2
Koch, N.3
Mayer, P.4
Tribastone, M.5
Varró, D.6
-
53
-
-
33646190477
-
Realizing model driven security for inter-organizational workflows with WS-CDL and UML 2.0
-
M. Hafner, and R. Breu Realizing model driven security for inter-organizational workflows with WS-CDL and UML 2.0 Proceedings of Model Driven Engineering Languages and Systems 3713 2005 39 53 10.1007/11557432-4
-
(2005)
Proceedings of Model Driven Engineering Languages and Systems
, vol.3713
, pp. 39-53
-
-
Hafner, M.1
Breu, R.2
-
56
-
-
47749117634
-
Modeling and enforcing advanced access control policies in healthcare systems with sectet
-
Springer Berlin Heidelberg
-
M. Hafner, M. Memon, and M. Alam Modeling and enforcing advanced access control policies in healthcare systems with sectet Models in Software Engineering 2008 Springer Berlin Heidelberg 132 144
-
(2008)
Models in Software Engineering
, pp. 132-144
-
-
Hafner, M.1
Memon, M.2
Alam, M.3
-
58
-
-
84899976809
-
Modeling and enforcing secure object flows in process-driven SOAs: An integrated model-driven approach
-
B. Hoisl, S. Sobernig, and M. Strembeck Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach Softw. Syst. Model. 13 2 2012 513 548 10.1007/s10270-012-0263-y
-
(2012)
Softw. Syst. Model.
, vol.13
, Issue.2
, pp. 513-548
-
-
Hoisl, B.1
Sobernig, S.2
Strembeck, M.3
-
60
-
-
79959917914
-
Empirical assessment of MDE in industry
-
ACM New York, NY, USA
-
J. Hutchinson, J. Whittle, M. Rouncefield, and S. Kristoffersen Empirical assessment of MDE in industry Proceedings of the 33rd International Conference on Software Engineering, ICSE'11 2011 ACM New York, NY, USA 471 480 10.1145/1985793.1985858
-
(2011)
Proceedings of the 33rd International Conference on Software Engineering, ICSE'11
, pp. 471-480
-
-
Hutchinson, J.1
Whittle, J.2
Rouncefield, M.3
Kristoffersen, S.4
-
62
-
-
80455173460
-
Security in model driven development: A survey
-
IEEE Computer Society Washington, DC, USA
-
J. Jensen, and M.G. Jaatun Security in model driven development: a survey Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES'11 2011 IEEE Computer Society Washington, DC, USA 704 709 10.1109/ARES.2011.110
-
(2011)
Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES'11
, pp. 704-709
-
-
Jensen, J.1
Jaatun, M.G.2
-
63
-
-
0242403961
-
UMLsec: Extending UML for secure systems development
-
Springer Berlin Heidelberg
-
J. Jürjens UMLsec: extending UML for secure systems development UML 2002 - The Unified Modeling Language 2002 Springer Berlin Heidelberg 1 9
-
(2002)
UML 2002 - The Unified Modeling Language
, pp. 1-9
-
-
Jürjens, J.1
-
65
-
-
33750060125
-
Model-based security engineering with UML
-
Springer Berlin Heidelberg
-
J. Jürjens Model-based security engineering with UML Foundations of Security Analysis and Design III 2005 Springer Berlin Heidelberg 42 77
-
(2005)
Foundations of Security Analysis and Design III
, pp. 42-77
-
-
Jürjens, J.1
-
69
-
-
35348959376
-
Tools for secure systems development with UML
-
J. Jürjens, and P. Shabalin Tools for secure systems development with UML Int. J. Softw. Tools Technol. 9 5-6 2007 527 544 10.1007/s10009-007-0048-8
-
(2007)
Int. J. Softw. Tools Technol.
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jürjens, J.1
Shabalin, P.2
-
71
-
-
79952916356
-
Model-driven development meets security: An evaluation of current approaches
-
IEEE Computer Society Washington, DC, USA
-
K. Kasal, J. Heurix, and T. Neubauer Model-driven development meets security: an evaluation of current approaches Proceedings of the 2011 44th Hawaii International Conference on System Sciences, HICSS'11 2011 IEEE Computer Society Washington, DC, USA 1 9 10.1109/HICSS.2011.310
-
(2011)
Proceedings of the 2011 44th Hawaii International Conference on System Sciences, HICSS'11
, pp. 1-9
-
-
Kasal, K.1
Heurix, J.2
Neubauer, T.3
-
73
-
-
0036818278
-
A synthesis of evaluation criteria for software specifications and specification techniques
-
A.A. Khwaja, and J.E. Urban A synthesis of evaluation criteria for software specifications and specification techniques Int. J. Softw. Eng. Knowl. Eng. 12 5 2002 581 599 10.1142/S0218194002001062
-
(2002)
Int. J. Softw. Eng. Knowl. Eng.
, vol.12
, Issue.5
, pp. 581-599
-
-
Khwaja, A.A.1
Urban, J.E.2
-
75
-
-
33144472884
-
Modeling role-based access control using parameterized UML models
-
Lecture Notes in Computer Science Springer Berlin, Heidelberg
-
D.-K. Kim, I. Ray, R. France, and N. Li Modeling role-based access control using parameterized UML models Fundamental Approaches to Software Engineering Lecture Notes in Computer Science 2004 Springer Berlin, Heidelberg 180 193
-
(2004)
Fundamental Approaches to Software Engineering
, pp. 180-193
-
-
Kim, D.-K.1
Ray, I.2
France, R.3
Li, N.4
-
76
-
-
80053564799
-
A feature-based approach for modeling role-based access control systems
-
S. Kim, D.-K. Kim, L. Lu, S. Kim, and S. Park A feature-based approach for modeling role-based access control systems J. Syst. Softw. 84 12 2011 2035 2052 10.1016/j.jss.2011.03.084
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.12
, pp. 2035-2052
-
-
Kim, S.1
Kim, D.-K.2
Lu, L.3
Kim, S.4
Park, S.5
-
78
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Lecture Notes in Computer Science Springer Berlin, Heidelberg
-
T. Lodderstedt, D. Basin, and J. Doser SecureUML: a UML-based modeling language for model-driven security UML 2002 - The Unified Modeling Language Lecture Notes in Computer Science 2002 Springer Berlin, Heidelberg 426 441
-
(2002)
UML 2002 - The Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
79
-
-
84915824542
-
-
Elsevier
-
L. Lucio, Q. Zhang, P.H. Nguyen, M. Amrani, J. Klein, H. Vangheluwe, and Y. Le Traon Advances in Model-Driven Security 2014 Elsevier
-
(2014)
Advances in Model-Driven Security
-
-
Lucio, L.1
Zhang, Q.2
Nguyen, P.H.3
Amrani, M.4
Klein, J.5
Vangheluwe, H.6
Le Traon, Y.7
-
80
-
-
84899994114
-
Security modeling for service-oriented systems using security pattern refinement approach
-
M. Memon, and G. Menghwar Security modeling for service-oriented systems using security pattern refinement approach Softw. Syst. Model. 2012 10.1007/s10270-012-0268-6
-
(2012)
Softw. Syst. Model.
-
-
Memon, M.1
Menghwar, G.2
-
82
-
-
77957265737
-
A Pattern-driven generation of security policies for service-oriented architectures
-
M. Menzel A Pattern-driven generation of security policies for service-oriented architectures Proceedings of International Conference on Web Services, ICWS 2010 243 250 10.1109/ICWS.2010.25
-
(2010)
Proceedings of International Conference on Web Services, ICWS
, pp. 243-250
-
-
Menzel, M.1
-
85
-
-
77949445049
-
Modeling security-critical applications with UML in the SecureMDD approach
-
N. Moebius, W. Reif, and K. Stenzel Modeling security-critical applications with UML in the SecureMDD approach Int. J. Adv. Intell. Syst. 1 1 2009 59 79
-
(2009)
Int. J. Adv. Intell. Syst.
, vol.1
, Issue.1
, pp. 59-79
-
-
Moebius, N.1
Reif, W.2
Stenzel, K.3
-
87
-
-
84873866087
-
Incremental development of large, secure smart card applications
-
N. Moebius, K. Stenzel, M. Borek, and W. Reif Incremental development of large, secure smart card applications Proceedings of the Workshop on Model-Driven Security 2012 1 6 10.1145/2422498.2422507 http://mdsec2012.pst.ifi.lmu.de
-
(2012)
Proceedings of the Workshop on Model-Driven Security
, pp. 1-6
-
-
Moebius, N.1
Stenzel, K.2
Borek, M.3
Reif, W.4
-
88
-
-
70349673753
-
SecureMDD: A model-driven development method for secure smart card applications
-
N. Moebius, K. Stenzel, H. Grandy, and W. Reif SecureMDD: a model-driven development method for secure smart card applications Proceedings of International Conference on Availability, Reliability and Security, 2009. ARES '09 2009 841 846 10.1109/ARES.2009.22
-
(2009)
Proceedings of International Conference on Availability, Reliability and Security, 2009. ARES '09
, pp. 841-846
-
-
Moebius, N.1
Stenzel, K.2
Grandy, H.3
Reif, W.4
-
91
-
-
84894243953
-
Enterprise security pattern: A model-driven architecture instance
-
S. Moral-García, S. Moral-Rubio, E.B. Fernández, and E. Fernández-Medina Enterprise security pattern: a model-driven architecture instance Comput. Stand. Interfaces 36 4 2014 748 758
-
(2014)
Comput. Stand. Interfaces
, vol.36
, Issue.4
, pp. 748-758
-
-
Moral-García, S.1
Moral-Rubio, S.2
Fernández, E.B.3
Fernández-Medina, E.4
-
92
-
-
78649790488
-
Security-driven model-based dynamic adaptation
-
ACM
-
B. Morin, T. Mouelhi, F. Fleurey, Y. Le Traon, O. Barais, and J.-M. Jézéquel Security-driven model-based dynamic adaptation Proceedings of the IEEE/ACM International Conference on Automated software engineering, ASE'10 2010 ACM 205 214
-
(2010)
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE'10
, pp. 205-214
-
-
Morin, B.1
Mouelhi, T.2
Fleurey, F.3
Le Traon, Y.4
Barais, O.5
Jézéquel, J.-M.6
-
93
-
-
56649117258
-
A model-based framework for security policy specification, deployment and testing
-
T. Mouelhi, F. Fleurey, B. Baudry, and Y.L. Traon A model-based framework for security policy specification, deployment and testing Proceedings of International Conference on Model Driven Engineering Languages and Systems 2008 537 552
-
(2008)
Proceedings of International Conference on Model Driven Engineering Languages and Systems
, pp. 537-552
-
-
Mouelhi, T.1
Fleurey, F.2
Baudry, B.3
Traon, Y.L.4
-
95
-
-
77952699852
-
Aspect-oriented modeling for representing and integrating security concerns in uml
-
Springer Berlin, Heidelberg
-
D. Mouheb, C. Talhi, M. Nouh, V. Lima, M. Debbabi, L. Wang, and M. Pourzandi Aspect-oriented modeling for representing and integrating security concerns in uml Software Engineering Research, Management and Applications 2010 2010 Springer Berlin, Heidelberg 197 213
-
(2010)
Software Engineering Research, Management and Applications 2010
, pp. 197-213
-
-
Mouheb, D.1
Talhi, C.2
Nouh, M.3
Lima, V.4
Debbabi, M.5
Wang, L.6
Pourzandi, M.7
-
96
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
H. Mouratidis, and P. Giorgini Secure tropos: a security-oriented extension of the tropos methodology Int. J. Softw. Eng. Knowl. Eng. 17 2 2007 285 309
-
(2007)
Int. J. Softw. Eng. Knowl. Eng.
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
102
-
-
84875987068
-
Model-driven adaptive delegation
-
ACM New York, NY, USA
-
P.H. Nguyen, G. Nain, J. Klein, T. Mouelhi, and Y. Le Traon Model-driven adaptive delegation Proceedings of the 12th Annual International Conference on Aspect-Oriented Software Development, AOSD'13 2013 ACM New York, NY, USA 61 72 10.1145/2451436.2451445
-
(2013)
Proceedings of the 12th Annual International Conference on Aspect-Oriented Software Development, AOSD'13
, pp. 61-72
-
-
Nguyen, P.H.1
Nain, G.2
Klein, J.3
Mouelhi, T.4
Le Traon, Y.5
-
103
-
-
84927646191
-
Modularity and dynamic adaptation of flexibly secure systems: Model-driven adaptive delegation in access control management
-
Springer
-
P.H. Nguyen, G. Nain, J. Klein, T. Mouelhi, and Y. Le Traon Modularity and dynamic adaptation of flexibly secure systems: model-driven adaptive delegation in access control management Proceedings of Transactions on Aspect-Oriented Software Development XI 2014 Springer 109 144
-
(2014)
Proceedings of Transactions on Aspect-Oriented Software Development XI
, pp. 109-144
-
-
Nguyen, P.H.1
Nain, G.2
Klein, J.3
Mouelhi, T.4
Le Traon, Y.5
-
104
-
-
0029345191
-
ANTLR: A predicated-ll (k) parser generator
-
T.J. Parr, and R.W. Quong ANTLR: a predicated-ll (k) parser generator Softw.: Pract. Exp. 25 7 1995 789 810
-
(1995)
Softw.: Pract. Exp.
, vol.25
, Issue.7
, pp. 789-810
-
-
Parr, T.J.1
Quong, R.W.2
-
105
-
-
77949562741
-
A framework of composable access control features: Preserving separation of access control concerns from models to code
-
J. Pavlich-Mariscal, S. Demurjian, and L. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Comput. Secur. 29 3 2010 350 379 10.1016/j.cose.2009.11.005
-
(2010)
Comput. Secur.
, vol.29
, Issue.3
, pp. 350-379
-
-
Pavlich-Mariscal, J.1
Demurjian, S.2
Michel, L.3
-
106
-
-
1942536622
-
An aspect-based approach to modeling access control concerns
-
I. Ray, R. France, N. Li, and G. Georg An aspect-based approach to modeling access control concerns Inf. Softw. Technol. 46 9 2004 575 587 http://dx.doi.org/10.1016/j.infsof.2003.10.007
-
(2004)
Inf. Softw. Technol.
, vol.46
, Issue.9
, pp. 575-587
-
-
Ray, I.1
France, R.2
Li, N.3
Georg, G.4
-
107
-
-
73149125546
-
ModelSec: A generative architecture for model-driven security
-
O. Sánchez, and F. Molina ModelSec: a generative architecture for model-driven security J. Univers. Comput. Sci. 15 15 2009 2957 2980
-
(2009)
J. Univers. Comput. Sci.
, vol.15
, Issue.15
, pp. 2957-2980
-
-
Sánchez, O.1
Molina, F.2
-
111
-
-
84905089674
-
Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems
-
S. Schefer-Wenzl, and M. Strembeck Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems Inf. Softw. Technol. 56 10 2014 1289 1308
-
(2014)
Inf. Softw. Technol.
, vol.56
, Issue.10
, pp. 1289-1308
-
-
Schefer-Wenzl, S.1
Strembeck, M.2
-
113
-
-
33749418648
-
An aspect oriented model driven framework
-
IEEE
-
D. Simmonds, A. Solberg, R. Reddy, R. France, and S. Ghosh An aspect oriented model driven framework Proceedings of 2005 Ninth IEEE International Enterprise Computing Conference, EDOC 2005 IEEE 119 130
-
(2005)
Proceedings of 2005 Ninth IEEE International Enterprise Computing Conference, EDOC
, pp. 119-130
-
-
Simmonds, D.1
Solberg, A.2
Reddy, R.3
France, R.4
Ghosh, S.5
-
115
-
-
69949118455
-
Designing secure data warehouses by using MDA and QVT
-
E. Soler, J. Trujillo, C. Blanco, and E. Fernández-Medina Designing secure data warehouses by using MDA and QVT J. UCS 15 8 2009 1607 1641
-
(2009)
J. UCS
, vol.15
, Issue.8
, pp. 1607-1641
-
-
Soler, E.1
Trujillo, J.2
Blanco, C.3
Fernández-Medina, E.4
-
116
-
-
34548165075
-
A framework for the development of secure data warehouses based on MDA and QVT
-
E. Soler, J. Trujillo, E. Fernandez-Medina, and M. Piattini A framework for the development of secure data warehouses based on MDA and QVT Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007 294 300 10.1109/ARES.2007.4
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security, ARES
, pp. 294-300
-
-
Soler, E.1
Trujillo, J.2
Fernandez-Medina, E.3
Piattini, M.4
-
117
-
-
34548156027
-
A set of QVT relations to transform PIM to PSM in the design of secure data warehouses
-
E. Soler, J. Trujillo, E. Fernandez-Medina, and M. Piattini A set of QVT relations to transform PIM to PSM in the design of secure data warehouses Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007 644 654 10.1109/ARES.2007.27
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security, ARES
, pp. 644-654
-
-
Soler, E.1
Trujillo, J.2
Fernandez-Medina, E.3
Piattini, M.4
-
118
-
-
34548157532
-
Application of QVT for the development of secure data warehouses: A case study
-
E. Soler, J. Trujillo, E. Fernandez-Medina, and M. Piattini Application of QVT for the development of secure data warehouses: a case study Proceedings of the Second International Conference on Availability, Reliability and Security, ARES vol. 3 2007 829 836 10.1109/ARES.2007.39
-
(2007)
Proceedings of the Second International Conference on Availability, Reliability and Security, ARES
, vol.3
, pp. 829-836
-
-
Soler, E.1
Trujillo, J.2
Fernandez-Medina, E.3
Piattini, M.4
-
119
-
-
67349151119
-
A UML 2.0 profile to define security requirements for data warehouses
-
J. Trujillo, E. Soler, E. Fernández-Medina, and M. Piattini A UML 2.0 profile to define security requirements for data warehouses Comput. Stand. Interfaces 31 5 2009 969 983 10.1016/j.csi.2008.09.040
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.5
, pp. 969-983
-
-
Trujillo, J.1
Soler, E.2
Fernández-Medina, E.3
Piattini, M.4
-
120
-
-
62349117518
-
An engineering process for developing secure data warehouses
-
J. Trujillo, E. Soler, E. Fernández-Medina, and M. Piattini An engineering process for developing secure data warehouses Inf. Softw. Technol. 51 6 2009 1033 1051 10.1016/j.infsof.2008.12.003
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.6
, pp. 1033-1051
-
-
Trujillo, J.1
Soler, E.2
Fernández-Medina, E.3
Piattini, M.4
-
121
-
-
84874788713
-
Engineering security into distributed systems: A survey of methodologies
-
A.V. Uzunov, E.B. Fernandez, and K. Falkner Engineering security into distributed systems: a survey of methodologies J. Univers. Comput. Sci. 18 20 2012 2920 3006
-
(2012)
J. Univers. Comput. Sci.
, vol.18
, Issue.20
, pp. 2920-3006
-
-
Uzunov, A.V.1
Fernandez, E.B.2
Falkner, K.3
-
123
-
-
84857652088
-
A practical application of our MDD approach for modeling secure XML data warehouses
-
B. Vela, C. Blanco, E. Fernández-Medina, and E. Marcos A practical application of our MDD approach for modeling secure XML data warehouses Decis. Support Syst. 52 4 2012 899 925 10.1016/j.dss.2011.11.008
-
(2012)
Decis. Support Syst.
, vol.52
, Issue.4
, pp. 899-925
-
-
Vela, B.1
Blanco, C.2
Fernández-Medina, E.3
Marcos, E.4
-
124
-
-
33749606997
-
Model driven development of secure XML databases
-
B. Vela, E. Fernández-Medina, E. Marcos, and M. Piattini Model driven development of secure XML databases ACM SIGMOD Rec. 35 3 2006 22 27 10.1145/1168092.1168095
-
(2006)
ACM SIGMOD Rec.
, vol.35
, Issue.3
, pp. 22-27
-
-
Vela, B.1
Fernández-Medina, E.2
Marcos, E.3
Piattini, M.4
-
125
-
-
84893644274
-
Development of secure XML data warehouses with QVT
-
B. Vela, J.N. Mazón, C. Blanco, E. Fernández-medina, J. Trujillo, and E. Marcos Development of secure XML data warehouses with QVT Inf. Softw. Technol. 55 9 2013 1651 1677 10.1016/j.infsof.2013.03.003
-
(2013)
Inf. Softw. Technol.
, vol.55
, Issue.9
, pp. 1651-1677
-
-
Vela, B.1
Mazón, J.N.2
Blanco, C.3
Fernández-Medina, E.4
Trujillo, J.5
Marcos, E.6
-
126
-
-
33644694835
-
A UML 2.0/OCL extension for designing secure data warehouses
-
R. Villarroel A UML 2.0/OCL extension for designing secure data warehouses J. Res. Pract. Inf. Technol. 38 1 2006 31 44
-
(2006)
J. Res. Pract. Inf. Technol.
, vol.38
, Issue.1
, pp. 31-44
-
-
Villarroel, R.1
-
128
-
-
84876283132
-
Systematic literature reviews in software engineering
-
C. Wohlin, and R. Prikladnicki Systematic literature reviews in software engineering Inf. Softw. Technol. 55 6 2013 919 920 http://dx.doi.org/10.1016/j.infsof.2013.02.002
-
(2013)
Inf. Softw. Technol.
, vol.55
, Issue.6
, pp. 919-920
-
-
Wohlin, C.1
Prikladnicki, R.2
-
129
-
-
63949084590
-
Model-driven business process security requirement specification
-
C. Wolter, M. Menzel, and A. Schaad Model-driven business process security requirement specification J. Syst. Archit. 55 4 2009 211 223 10.1016/j.sysarc.2008.10.002
-
(2009)
J. Syst. Archit.
, vol.55
, Issue.4
, pp. 211-223
-
-
Wolter, C.1
Menzel, M.2
Schaad, A.3
-
130
-
-
60749137642
-
An adaptive security model using agent-oriented MDA
-
L. Xiao An adaptive security model using agent-oriented MDA Inf. Softw. Technol. 51 5 2009 933 955 10.1016/j.infsof.2008.05.005
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 933-955
-
-
Xiao, L.1
-
131
-
-
60849089332
-
A model-based aspect-oriented framework for building intrusion-aware software systems
-
Z.J. Zhu, and M. Zulkernine A model-based aspect-oriented framework for building intrusion-aware software systems Inf. Softw. Technol. 51 5 2009 865 875 10.1016/j.infsof.2008.05.007
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 865-875
-
-
Zhu, Z.J.1
Zulkernine, M.2
|