메뉴 건너뛰기




Volumn 68, Issue , 2015, Pages 62-81

An extensive systematic review on the Model-Driven Development of secure systems

Author keywords

MDE; MDS; Model Driven Engineering; Model Driven Security; Software security engineering; Systematic review

Indexed keywords

MENDELEVIUM; PROBLEM ORIENTED LANGUAGES; SEARCH ENGINES;

EID: 84942611940     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2015.08.006     Document Type: Article
Times cited : (78)

References (131)
  • 1
    • 84859434803 scopus 로고    scopus 로고
    • A methodology for integrating access control policies within database development
    • J. Abramov, O. Anson, M. Dahan, P. Shoval, and A. Sturm A methodology for integrating access control policies within database development Comput. Secur. 31 3 2012 299 314 10.1016/j.cose.2012.01.004
    • (2012) Comput. Secur. , vol.31 , Issue.3 , pp. 299-314
    • Abramov, J.1    Anson, O.2    Dahan, M.3    Shoval, P.4    Sturm, A.5
  • 3
    • 84861955129 scopus 로고    scopus 로고
    • Evaluation of the pattern-based method for secure development (PbSD): A controlled experiment
    • J. Abramov, A. Sturm, and P. Shoval Evaluation of the pattern-based method for secure development (PbSD): a controlled experiment Inf. Softw. Technol. 54 9 2012 1029 1043 10.1016/j.infsof.2012.04.001
    • (2012) Inf. Softw. Technol. , vol.54 , Issue.9 , pp. 1029-1043
    • Abramov, J.1    Sturm, A.2    Shoval, P.3
  • 5
    • 38149075083 scopus 로고    scopus 로고
    • Model driven security engineering for the realization of dynamic security requirements in collaborative systems
    • M. Alam Model driven security engineering for the realization of dynamic security requirements in collaborative systems Models Softw. Eng. 4364 2007 278 287 10.1007/978-3-540-69489-2-34
    • (2007) Models Softw. Eng. , vol.4364 , pp. 278-287
    • Alam, M.1
  • 12
    • 84898843700 scopus 로고    scopus 로고
    • Adaptable, model-driven security engineering for SaaS cloud-based applications
    • M. Almorsy, J. Grundy, and A.S. Ibrahim Adaptable, model-driven security engineering for SaaS cloud-based applications Autom. Softw. Eng. 21 2 2013 187 224 10.1007/s10515-013-0133-z
    • (2013) Autom. Softw. Eng. , vol.21 , Issue.2 , pp. 187-224
    • Almorsy, M.1    Grundy, J.2    Ibrahim, A.S.3
  • 13
    • 38049059202 scopus 로고    scopus 로고
    • A metamodel-based approach for analyzing security-design models
    • G. Engels, B. Opdyke, D. Schmidt, F. Weil, Volume 4735 of Lecture Notes in Computer Science Springer Berlin, Heidelberg
    • D. Basin, M. Clavel, J. Doser, and M. Egea A metamodel-based approach for analyzing security-design models G. Engels, B. Opdyke, D. Schmidt, F. Weil, Model Driven Engineering Languages and Systems Volume 4735 of Lecture Notes in Computer Science 2007 Springer Berlin, Heidelberg 420 435 10.1007/978-3-540-75209-7-29
    • (2007) Model Driven Engineering Languages and Systems , pp. 420-435
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 14
    • 60849104397 scopus 로고    scopus 로고
    • Automated analysis of security-design models
    • D. Basin, M. Clavel, J. Doser, and M. Egea Automated analysis of security-design models Inf. Softw. Technol. 51 5 2009 815 831 10.1016/j.infsof.2008.05.011
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.5 , pp. 815-831
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 16
    • 84857748057 scopus 로고    scopus 로고
    • Model-driven development of security-aware GUIs for data-centric applications
    • Springer Berlin Heidelberg
    • D. Basin, M. Clavel, and M. Egea Model-driven development of security-aware GUIs for data-centric applications Foundations of Security Analysis and Design VI 2011 Springer Berlin Heidelberg 101 124
    • (2011) Foundations of Security Analysis and Design VI , pp. 101-124
    • Basin, D.1    Clavel, M.2    Egea, M.3
  • 17
    • 84900546483 scopus 로고    scopus 로고
    • A model-driven methodology for developing secure data-management applications
    • D. Basin, M. Clavel, M. Egea, M.A.G. de Dios, and C. Dania A model-driven methodology for developing secure data-management applications IEEE Trans. Softw. Eng. 40 4 2014 324 337
    • (2014) IEEE Trans. Softw. Eng. , vol.40 , Issue.4 , pp. 324-337
    • Basin, D.1    Clavel, M.2    Egea, M.3    De Dios, M.A.G.4    Dania, C.5
  • 19
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • D. Basin, J. Doser, and T. Lodderstedt Model driven security: from UML models to access control infrastructures ACM Trans. Softw. Eng. Methodol. 15 2006 39 91 10.1145/1125808.1125810
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 24
    • 68049118693 scopus 로고    scopus 로고
    • Applying QVT in order to implement secure data warehouses in SQL server analysis services
    • C. Blanco Applying QVT in order to implement secure data warehouses in SQL server analysis services J. Res. Pract. Inf. Technol. 41 2 2009 135
    • (2009) J. Res. Pract. Inf. Technol. , vol.41 , Issue.2 , pp. 135
    • Blanco, C.1
  • 25
    • 84942645909 scopus 로고    scopus 로고
    • Modernizing secure OLAP applications with a model-driven approach
    • C. Blanco, E. Fernandez-Medina, and J. Trujillo Modernizing secure OLAP applications with a model-driven approach Comput. J. 2014 10.1093/comjnl/bxu070
    • (2014) Comput. J.
    • Blanco, C.1    Fernandez-Medina, E.2    Trujillo, J.3
  • 26
    • 84897040963 scopus 로고    scopus 로고
    • Showing the benefits of applying a model driven architecture for developing secure OLAP applications
    • C. Blanco, and I. de Guzmán Showing the benefits of applying a model driven architecture for developing secure OLAP applications. J. UCS 20 2 2014 79 106
    • (2014) J. UCS , vol.20 , Issue.2 , pp. 79-106
    • Blanco, C.1    De Guzmán, I.2
  • 30
    • 79959698716 scopus 로고    scopus 로고
    • A transformation contract to generate aspects from access control policies
    • C. Braga A transformation contract to generate aspects from access control policies Softw. Syst. Model. 10 3 2011 395 409 10.1007/s10270-010-0156-x
    • (2011) Softw. Syst. Model. , vol.10 , Issue.3 , pp. 395-409
    • Braga, C.1
  • 31
    • 84880445741 scopus 로고    scopus 로고
    • Model-Driven Software Engineering in Practice
    • 1st edition Morgan & Claypool Publishers
    • M. Brambilla, J. Cabot, and M. Wimmer Model-Driven Software Engineering in Practice 1st edition Synthesis Lectures on Software Engineering 2012 Morgan & Claypool Publishers http://dx.doi.org/10.2200/S00441ED1V01Y201208SWE001
    • (2012) Synthesis Lectures on Software Engineering
    • Brambilla, M.1    Cabot, J.2    Wimmer, M.3
  • 32
    • 84994715673 scopus 로고    scopus 로고
    • Model-driven security engineering of service oriented systems
    • Lecture Notes in Business Information Processing Springer Berlin, Heidelberg
    • R. Breu, M. Hafner, F. Innerhofer-Oberperfler, and F. Wozak Model-driven security engineering of service oriented systems Information Systems and e-Business Technologies Lecture Notes in Business Information Processing 2008 Springer Berlin, Heidelberg 59 71
    • (2008) Information Systems and E-Business Technologies , pp. 59-71
    • Breu, R.1    Hafner, M.2    Innerhofer-Oberperfler, F.3    Wozak, F.4
  • 33
    • 26844470176 scopus 로고    scopus 로고
    • Model driven security for inter-organizational workflows in e-government
    • Springer Berlin Heidelberg
    • R. Breu, M. Hafner, B. Weber, and A. Novak Model driven security for inter-organizational workflows in e-government E-Government: Towards Electronic Democracy 2005 Springer Berlin Heidelberg 122 133
    • (2005) E-Government: Towards Electronic Democracy , pp. 122-133
    • Breu, R.1    Hafner, M.2    Weber, B.3    Novak, A.4
  • 34
    • 35348977674 scopus 로고    scopus 로고
    • Model based development of access policies
    • R. Breu, G. Popp, and M. Alam Model based development of access policies Int. J. Softw. Tools Technol. Transf. 9 5-6 2007 457 470 10.1007/s10009-007-0045-y
    • (2007) Int. J. Softw. Tools Technol. Transf. , vol.9 , Issue.5-6 , pp. 457-470
    • Breu, R.1    Popp, G.2    Alam, M.3
  • 35
    • 33750286091 scopus 로고    scopus 로고
    • A model transformation semantics and analysis methodology for SecureUML
    • Springer Berlin, Heidelberg
    • A. Brucker, J. Doser, and B. Wolff A model transformation semantics and analysis methodology for SecureUML Lecture Notes in Computer Science 2006 Springer Berlin, Heidelberg 306 320
    • (2006) Lecture Notes in Computer Science , pp. 306-320
    • Brucker, A.1    Doser, J.2    Wolff, B.3
  • 38
    • 70349862227 scopus 로고    scopus 로고
    • Model-driven security in practice: An industrial experience
    • Lecture Notes in Computer Science Springer Berlin, Heidelberg
    • M. Clavel, V. Silva, C. Braga, and M. Egea Model-driven security in practice: an industrial experience Model Driven Architecture - Foundations and Applications Lecture Notes in Computer Science 2008 Springer Berlin, Heidelberg 326 337
    • (2008) Model Driven Architecture - Foundations and Applications , pp. 326-337
    • Clavel, M.1    Silva, V.2    Braga, C.3    Egea, M.4
  • 44
  • 46
    • 34247643088 scopus 로고    scopus 로고
    • Developing secure data warehouses with a UML extension
    • E. Fernández-Medina, J. Trujillo, R. Villarroel, and M. Piattini Developing secure data warehouses with a UML extension Inf. Syst. 32 6 2006 826 856 10.1016/j.is.2006.07.003
    • (2006) Inf. Syst. , vol.32 , Issue.6 , pp. 826-856
    • Fernández-Medina, E.1    Trujillo, J.2    Villarroel, R.3    Piattini, M.4
  • 47
    • 29244463832 scopus 로고    scopus 로고
    • An MDA approach to access control specifications using MOF and UML profiles
    • T. Fink, M. Koch, and K. Pauls An MDA approach to access control specifications using MOF and UML profiles Electron. Notes Theor. Comput. Sci. 142 2006 161 179 10.1016/j.entcs.2004.12.045
    • (2006) Electron. Notes Theor. Comput. Sci. , vol.142 , pp. 161-179
    • Fink, T.1    Koch, M.2    Pauls, K.3
  • 51
    • 79959767827 scopus 로고    scopus 로고
    • Non-functional properties in the model-driven development of service-oriented systems
    • S. Gilmore, L. Gönczy, N. Koch, P. Mayer, M. Tribastone, and D. Varró Non-functional properties in the model-driven development of service-oriented systems Softw. Syst. Model. 10 3 2010 287 311 10.1007/s10270-010-0155-y
    • (2010) Softw. Syst. Model. , vol.10 , Issue.3 , pp. 287-311
    • Gilmore, S.1    Gönczy, L.2    Koch, N.3    Mayer, P.4    Tribastone, M.5    Varró, D.6
  • 53
    • 33646190477 scopus 로고    scopus 로고
    • Realizing model driven security for inter-organizational workflows with WS-CDL and UML 2.0
    • M. Hafner, and R. Breu Realizing model driven security for inter-organizational workflows with WS-CDL and UML 2.0 Proceedings of Model Driven Engineering Languages and Systems 3713 2005 39 53 10.1007/11557432-4
    • (2005) Proceedings of Model Driven Engineering Languages and Systems , vol.3713 , pp. 39-53
    • Hafner, M.1    Breu, R.2
  • 54
    • 84892347137 scopus 로고    scopus 로고
    • Extending sectet: Advanced security policy
    • Springer Berlin, Heidelberg
    • M. Hafner, and R. Breu Extending sectet: advanced security policy Security Engineering for Service-Oriented Architectures 2009 Springer Berlin, Heidelberg 159 188 10.1007/978-3-540-79539-1-7
    • (2009) Security Engineering for Service-Oriented Architectures , pp. 159-188
    • Hafner, M.1    Breu, R.2
  • 55
    • 84892347137 scopus 로고    scopus 로고
    • Modeling security critical SOA applications
    • Springer Berlin, Heidelberg
    • M. Hafner, and R. Breu Modeling security critical SOA applications Security Engineering for Service-Oriented Architectures 2009 Springer Berlin, Heidelberg 93 119 10.1007/978-3-540-79539-1-7
    • (2009) Security Engineering for Service-Oriented Architectures , pp. 93-119
    • Hafner, M.1    Breu, R.2
  • 56
    • 47749117634 scopus 로고    scopus 로고
    • Modeling and enforcing advanced access control policies in healthcare systems with sectet
    • Springer Berlin Heidelberg
    • M. Hafner, M. Memon, and M. Alam Modeling and enforcing advanced access control policies in healthcare systems with sectet Models in Software Engineering 2008 Springer Berlin Heidelberg 132 144
    • (2008) Models in Software Engineering , pp. 132-144
    • Hafner, M.1    Memon, M.2    Alam, M.3
  • 58
    • 84899976809 scopus 로고    scopus 로고
    • Modeling and enforcing secure object flows in process-driven SOAs: An integrated model-driven approach
    • B. Hoisl, S. Sobernig, and M. Strembeck Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach Softw. Syst. Model. 13 2 2012 513 548 10.1007/s10270-012-0263-y
    • (2012) Softw. Syst. Model. , vol.13 , Issue.2 , pp. 513-548
    • Hoisl, B.1    Sobernig, S.2    Strembeck, M.3
  • 63
    • 0242403961 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • Springer Berlin Heidelberg
    • J. Jürjens UMLsec: extending UML for secure systems development UML 2002 - The Unified Modeling Language 2002 Springer Berlin Heidelberg 1 9
    • (2002) UML 2002 - The Unified Modeling Language , pp. 1-9
    • Jürjens, J.1
  • 65
  • 69
    • 35348959376 scopus 로고    scopus 로고
    • Tools for secure systems development with UML
    • J. Jürjens, and P. Shabalin Tools for secure systems development with UML Int. J. Softw. Tools Technol. 9 5-6 2007 527 544 10.1007/s10009-007-0048-8
    • (2007) Int. J. Softw. Tools Technol. , vol.9 , Issue.5-6 , pp. 527-544
    • Jürjens, J.1    Shabalin, P.2
  • 73
    • 0036818278 scopus 로고    scopus 로고
    • A synthesis of evaluation criteria for software specifications and specification techniques
    • A.A. Khwaja, and J.E. Urban A synthesis of evaluation criteria for software specifications and specification techniques Int. J. Softw. Eng. Knowl. Eng. 12 5 2002 581 599 10.1142/S0218194002001062
    • (2002) Int. J. Softw. Eng. Knowl. Eng. , vol.12 , Issue.5 , pp. 581-599
    • Khwaja, A.A.1    Urban, J.E.2
  • 75
    • 33144472884 scopus 로고    scopus 로고
    • Modeling role-based access control using parameterized UML models
    • Lecture Notes in Computer Science Springer Berlin, Heidelberg
    • D.-K. Kim, I. Ray, R. France, and N. Li Modeling role-based access control using parameterized UML models Fundamental Approaches to Software Engineering Lecture Notes in Computer Science 2004 Springer Berlin, Heidelberg 180 193
    • (2004) Fundamental Approaches to Software Engineering , pp. 180-193
    • Kim, D.-K.1    Ray, I.2    France, R.3    Li, N.4
  • 76
    • 80053564799 scopus 로고    scopus 로고
    • A feature-based approach for modeling role-based access control systems
    • S. Kim, D.-K. Kim, L. Lu, S. Kim, and S. Park A feature-based approach for modeling role-based access control systems J. Syst. Softw. 84 12 2011 2035 2052 10.1016/j.jss.2011.03.084
    • (2011) J. Syst. Softw. , vol.84 , Issue.12 , pp. 2035-2052
    • Kim, S.1    Kim, D.-K.2    Lu, L.3    Kim, S.4    Park, S.5
  • 78
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Lecture Notes in Computer Science Springer Berlin, Heidelberg
    • T. Lodderstedt, D. Basin, and J. Doser SecureUML: a UML-based modeling language for model-driven security UML 2002 - The Unified Modeling Language Lecture Notes in Computer Science 2002 Springer Berlin, Heidelberg 426 441
    • (2002) UML 2002 - The Unified Modeling Language , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 80
    • 84899994114 scopus 로고    scopus 로고
    • Security modeling for service-oriented systems using security pattern refinement approach
    • M. Memon, and G. Menghwar Security modeling for service-oriented systems using security pattern refinement approach Softw. Syst. Model. 2012 10.1007/s10270-012-0268-6
    • (2012) Softw. Syst. Model.
    • Memon, M.1    Menghwar, G.2
  • 82
    • 77957265737 scopus 로고    scopus 로고
    • A Pattern-driven generation of security policies for service-oriented architectures
    • M. Menzel A Pattern-driven generation of security policies for service-oriented architectures Proceedings of International Conference on Web Services, ICWS 2010 243 250 10.1109/ICWS.2010.25
    • (2010) Proceedings of International Conference on Web Services, ICWS , pp. 243-250
    • Menzel, M.1
  • 85
    • 77949445049 scopus 로고    scopus 로고
    • Modeling security-critical applications with UML in the SecureMDD approach
    • N. Moebius, W. Reif, and K. Stenzel Modeling security-critical applications with UML in the SecureMDD approach Int. J. Adv. Intell. Syst. 1 1 2009 59 79
    • (2009) Int. J. Adv. Intell. Syst. , vol.1 , Issue.1 , pp. 59-79
    • Moebius, N.1    Reif, W.2    Stenzel, K.3
  • 96
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • H. Mouratidis, and P. Giorgini Secure tropos: a security-oriented extension of the tropos methodology Int. J. Softw. Eng. Knowl. Eng. 17 2 2007 285 309
    • (2007) Int. J. Softw. Eng. Knowl. Eng. , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 104
    • 0029345191 scopus 로고
    • ANTLR: A predicated-ll (k) parser generator
    • T.J. Parr, and R.W. Quong ANTLR: a predicated-ll (k) parser generator Softw.: Pract. Exp. 25 7 1995 789 810
    • (1995) Softw.: Pract. Exp. , vol.25 , Issue.7 , pp. 789-810
    • Parr, T.J.1    Quong, R.W.2
  • 105
    • 77949562741 scopus 로고    scopus 로고
    • A framework of composable access control features: Preserving separation of access control concerns from models to code
    • J. Pavlich-Mariscal, S. Demurjian, and L. Michel A framework of composable access control features: preserving separation of access control concerns from models to code Comput. Secur. 29 3 2010 350 379 10.1016/j.cose.2009.11.005
    • (2010) Comput. Secur. , vol.29 , Issue.3 , pp. 350-379
    • Pavlich-Mariscal, J.1    Demurjian, S.2    Michel, L.3
  • 106
    • 1942536622 scopus 로고    scopus 로고
    • An aspect-based approach to modeling access control concerns
    • I. Ray, R. France, N. Li, and G. Georg An aspect-based approach to modeling access control concerns Inf. Softw. Technol. 46 9 2004 575 587 http://dx.doi.org/10.1016/j.infsof.2003.10.007
    • (2004) Inf. Softw. Technol. , vol.46 , Issue.9 , pp. 575-587
    • Ray, I.1    France, R.2    Li, N.3    Georg, G.4
  • 107
    • 73149125546 scopus 로고    scopus 로고
    • ModelSec: A generative architecture for model-driven security
    • O. Sánchez, and F. Molina ModelSec: a generative architecture for model-driven security J. Univers. Comput. Sci. 15 15 2009 2957 2980
    • (2009) J. Univers. Comput. Sci. , vol.15 , Issue.15 , pp. 2957-2980
    • Sánchez, O.1    Molina, F.2
  • 108
    • 75449109427 scopus 로고    scopus 로고
    • Model-driven development for early aspects
    • P. Sánchez, A. Moreira, and L. Fuentes Model-driven development for early aspects Inf. Softw. Technol. 52 3 2010 249 273
    • (2010) Inf. Softw. Technol. , vol.52 , Issue.3 , pp. 249-273
    • Sánchez, P.1    Moreira, A.2    Fuentes, L.3
  • 111
    • 84905089674 scopus 로고    scopus 로고
    • Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems
    • S. Schefer-Wenzl, and M. Strembeck Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems Inf. Softw. Technol. 56 10 2014 1289 1308
    • (2014) Inf. Softw. Technol. , vol.56 , Issue.10 , pp. 1289-1308
    • Schefer-Wenzl, S.1    Strembeck, M.2
  • 115
    • 69949118455 scopus 로고    scopus 로고
    • Designing secure data warehouses by using MDA and QVT
    • E. Soler, J. Trujillo, C. Blanco, and E. Fernández-Medina Designing secure data warehouses by using MDA and QVT J. UCS 15 8 2009 1607 1641
    • (2009) J. UCS , vol.15 , Issue.8 , pp. 1607-1641
    • Soler, E.1    Trujillo, J.2    Blanco, C.3    Fernández-Medina, E.4
  • 119
    • 67349151119 scopus 로고    scopus 로고
    • A UML 2.0 profile to define security requirements for data warehouses
    • J. Trujillo, E. Soler, E. Fernández-Medina, and M. Piattini A UML 2.0 profile to define security requirements for data warehouses Comput. Stand. Interfaces 31 5 2009 969 983 10.1016/j.csi.2008.09.040
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.5 , pp. 969-983
    • Trujillo, J.1    Soler, E.2    Fernández-Medina, E.3    Piattini, M.4
  • 120
    • 62349117518 scopus 로고    scopus 로고
    • An engineering process for developing secure data warehouses
    • J. Trujillo, E. Soler, E. Fernández-Medina, and M. Piattini An engineering process for developing secure data warehouses Inf. Softw. Technol. 51 6 2009 1033 1051 10.1016/j.infsof.2008.12.003
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.6 , pp. 1033-1051
    • Trujillo, J.1    Soler, E.2    Fernández-Medina, E.3    Piattini, M.4
  • 121
    • 84874788713 scopus 로고    scopus 로고
    • Engineering security into distributed systems: A survey of methodologies
    • A.V. Uzunov, E.B. Fernandez, and K. Falkner Engineering security into distributed systems: a survey of methodologies J. Univers. Comput. Sci. 18 20 2012 2920 3006
    • (2012) J. Univers. Comput. Sci. , vol.18 , Issue.20 , pp. 2920-3006
    • Uzunov, A.V.1    Fernandez, E.B.2    Falkner, K.3
  • 123
    • 84857652088 scopus 로고    scopus 로고
    • A practical application of our MDD approach for modeling secure XML data warehouses
    • B. Vela, C. Blanco, E. Fernández-Medina, and E. Marcos A practical application of our MDD approach for modeling secure XML data warehouses Decis. Support Syst. 52 4 2012 899 925 10.1016/j.dss.2011.11.008
    • (2012) Decis. Support Syst. , vol.52 , Issue.4 , pp. 899-925
    • Vela, B.1    Blanco, C.2    Fernández-Medina, E.3    Marcos, E.4
  • 124
  • 126
    • 33644694835 scopus 로고    scopus 로고
    • A UML 2.0/OCL extension for designing secure data warehouses
    • R. Villarroel A UML 2.0/OCL extension for designing secure data warehouses J. Res. Pract. Inf. Technol. 38 1 2006 31 44
    • (2006) J. Res. Pract. Inf. Technol. , vol.38 , Issue.1 , pp. 31-44
    • Villarroel, R.1
  • 128
    • 84876283132 scopus 로고    scopus 로고
    • Systematic literature reviews in software engineering
    • C. Wohlin, and R. Prikladnicki Systematic literature reviews in software engineering Inf. Softw. Technol. 55 6 2013 919 920 http://dx.doi.org/10.1016/j.infsof.2013.02.002
    • (2013) Inf. Softw. Technol. , vol.55 , Issue.6 , pp. 919-920
    • Wohlin, C.1    Prikladnicki, R.2
  • 129
    • 63949084590 scopus 로고    scopus 로고
    • Model-driven business process security requirement specification
    • C. Wolter, M. Menzel, and A. Schaad Model-driven business process security requirement specification J. Syst. Archit. 55 4 2009 211 223 10.1016/j.sysarc.2008.10.002
    • (2009) J. Syst. Archit. , vol.55 , Issue.4 , pp. 211-223
    • Wolter, C.1    Menzel, M.2    Schaad, A.3
  • 130
    • 60749137642 scopus 로고    scopus 로고
    • An adaptive security model using agent-oriented MDA
    • L. Xiao An adaptive security model using agent-oriented MDA Inf. Softw. Technol. 51 5 2009 933 955 10.1016/j.infsof.2008.05.005
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.5 , pp. 933-955
    • Xiao, L.1
  • 131
    • 60849089332 scopus 로고    scopus 로고
    • A model-based aspect-oriented framework for building intrusion-aware software systems
    • Z.J. Zhu, and M. Zulkernine A model-based aspect-oriented framework for building intrusion-aware software systems Inf. Softw. Technol. 51 5 2009 865 875 10.1016/j.infsof.2008.05.007
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.5 , pp. 865-875
    • Zhu, Z.J.1    Zulkernine, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.