-
1
-
-
0002652530
-
Security protocols and their properties
-
F. Bauer and R Steinbrüggen, editors, IOS Press, Amsterdam,. 20th International Summer School, Marktoberdorf, Germany
-
M. Abadi. Security protocols and their properties. In F. Bauer and R Steinbrüggen, editors, Foundations of Secure Computation, pages 39-60. IOS Press, Amsterdam, 2000. 20th International Summer School, Marktoberdorf, Germany.
-
(2000)
Foundations of Secure Computation
, pp. 39-60
-
-
Abadi, M.1
-
2
-
-
52649095905
-
Automatically detecting and visualising errors in UML diagrams
-
L. Campbell, B. Cheng, W. McUmber, and K. Stirewalt. Automatically detecting and visualising errors in UML diagrams. Requir. Eng., 7(4):264-287, 2002.
-
(2002)
Requir. Eng.
, vol.7
, Issue.4
, pp. 264-287
-
-
Campbell, L.1
Cheng, B.2
McUmber, W.3
Stirewalt, K.4
-
3
-
-
0037271415
-
First-order verification of cryptographic protocols
-
E. Cohen. First-order verification of cryptographic protocols. Journal of Computer Security, 11(2):189-216, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 189-216
-
-
Cohen, E.1
-
5
-
-
84944067116
-
DPS: An architectural style for development of secure software
-
G. Davida, Y. Frankel, and O. Rees, editors, International Conference on Infrastructure Security (InfraSec 2002), Springer
-
P. Fenkam, H. Gall, M. Jazayeri, and C. Krügel. DPS: An architectural style for development of secure software. In G. Davida, Y. Frankel, and O. Rees, editors, International Conference on Infrastructure Security (InfraSec 2002), volume 2437 of LNCS, pages 180-198. Springer, 2002.
-
(2002)
LNCS
, vol.2437
, pp. 180-198
-
-
Fenkam, P.1
Gall, H.2
Jazayeri, M.3
Krügel, C.4
-
6
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
I.-Y. Song, S. Liddle, T. Ling, and P. Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), Springer
-
P. Giorgini, F. Massacci, and J. Mylopoulos. Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In I.-Y. Song, S. Liddle, T. Ling, and P. Scheuermann, editors, 22nd International Conference on Conceptual Modeling (ER 2003), volume 2813 of LNCS, pages 263-276. Springer, 2003.
-
(2003)
LNCS
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
8
-
-
0036149234
-
Correctness by construction: Developing a commercial secure system
-
A. Hall and R. Chapman. Correctness by construction: Developing a commercial secure system. IEEE Software, 19(1):18-25, 2002.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
9
-
-
33244490092
-
Specification modeling and validation applied to a family of network security products
-
R. Hall. Specification modeling and validation applied to a family of network security products. In ASE01 [10], pages 71-80.
-
ASE01
, Issue.10
, pp. 71-80
-
-
Hall, R.1
-
11
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2002 - The Unified Modeling Language, Springer
-
J. Jürjens. UMLsec: Extending UML for secure systems development. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2002 - The Unified Modeling Language, volume 2460 of LNCS, pages 412-425. Springer, 2002.
-
(2002)
LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
12
-
-
0036037169
-
Using UMLsec and goal-trees for secure systems development
-
G. Lamont, H. Haddad, G. Papadopoulos, and B. Panda, editors, ACM Press
-
J. Jurjens. Using UMLsec and goal-trees for secure systems development. In G. Lamont, H. Haddad, G. Papadopoulos, and B. Panda, editors, Proceedings of the 2002 Symposium of Applied Computing (SAC), pages 1026-1031. ACM Press, 2002.
-
(2002)
Proceedings of the 2002 Symposium of Applied Computing (SAC)
, pp. 1026-1031
-
-
Jurjens, J.1
-
14
-
-
33244458485
-
-
J. Jürjens, E. Fernandez, R. France, and B. Rumpe, editors. TU München Technical Report,. UML 2004 satellite workshop proceedings
-
J. Jürjens, E. Fernandez, R. France, and B. Rumpe, editors. Critical Systems Development with UML (CSDUML 2004), TU München Technical Report, 2004. UML 2004 satellite workshop proceedings.
-
(2004)
Critical Systems Development with UML (CSDUML 2004)
-
-
-
15
-
-
23944491305
-
Automated verification of UMLsec models for security requirements
-
J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2004 - The Unified Modeling Language, Springer
-
J. Jürjens and P. Shabalin. Automated verification of UMLsec models for security requirements. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, UML 2004 - The Unified Modeling Language, volume 2460 of LNCS, pages 412-425. Springer, 2004.
-
(2004)
LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
Shabalin, P.2
-
16
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
May
-
R. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, May 1989.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.1
-
19
-
-
84947758978
-
Formalising UML state machines for model checking
-
R. France and B. Rumpe, editors, The Unified Modeling Language (UML 1999), Springer
-
J. Lilius and I. Porres. Formalising UML state machines for model checking. In R. France and B. Rumpe, editors, The Unified Modeling Language (UML 1999), volume 1723 of LNCS, pages 430-445. Springer, 1999.
-
(1999)
LNCS
, vol.1723
, pp. 430-445
-
-
Lilius, J.1
Porres, I.2
-
20
-
-
0026152198
-
A system for the specification and analysis of key management protocols
-
C. Meadows. A system for the specification and analysis of key management protocols. In IEEE Symposium on Security and Privacy, pages 182-195, 1991.
-
(1991)
IEEE Symposium on Security and Privacy
, pp. 182-195
-
-
Meadows, C.1
-
22
-
-
0031109240
-
SETHEO and E-SETHEO - The CADE-13 Systems
-
M. Moser, O. Ibens, R. Letz, J. Steinbach, C. Goller, J. Schumann, and K. Mayr. SETHEO and E-SETHEO - The CADE-13 Systems. Journal of Automated Reasoning (JAR), 18(2):237-246, 1997.
-
(1997)
Journal of Automated Reasoning (JAR)
, vol.18
, Issue.2
, pp. 237-246
-
-
Moser, M.1
Ibens, O.2
Letz, R.3
Steinbach, J.4
Goller, C.5
Schumann, J.6
Mayr, K.7
-
23
-
-
7744220233
-
-
Netbeans project. Open source. Available from http://mdr.netbeans.org, 2003.
-
(2003)
Open Source
-
-
-
25
-
-
84957071248
-
Automatic verification of cryptographic protocols with SETHEO
-
W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14), Springer
-
J. Schumann, Automatic verification of cryptographic protocols with SETHEO. In W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14), volume 1249 of LNCS, pages 87-100. Springer, 1997.
-
(1997)
LNCS
, vol.1249
, pp. 87-100
-
-
Schumann, J.1
-
27
-
-
0037764276
-
-
UMLsec tool, 2002-04. Open-source. Accessible at http://www.umlsec.org.
-
(2002)
Open-source
-
-
-
28
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
IEEE Computer Society
-
A. van Lamsweerde. Elaborating security requirements by construction of intentional anti-models. In ICSE, pages 148-157. IEEE Computer Society, 2004.
-
(2004)
ICSE
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
31
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16)
-
C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16), volume 1632 of LNCS, pages 314-328, 1999.
-
(1999)
LNCS
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
-
32
-
-
84943191409
-
Knowledge base approach to consistency management of UML specification
-
A. Zisman and A. Kozlenkov. Knowledge base approach to consistency management of UML specification. In ASE01 [10], pages 359-363.
-
ASE01
, Issue.10
, pp. 359-363
-
-
Zisman, A.1
Kozlenkov, A.2
|