Extensión UML para Casos de Uso Reutilizables en entornos Grid Móviles Seguros
暂无分享,去创建一个
Eduardo Fernández-Medina | David G. Rosado | Javier López | David G. Rosado | Eduardo Fernández-Medina | Javier López
[1] Thomas Phan,et al. Challenge: integrating mobile wireless devices into the computational grid , 2002, MobiCom '02.
[2] Haralambos Mouratidis,et al. Integrating Security and Software Engineering: Advances and Future Visions , 2006 .
[3] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[4] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[5] Ivar Jacobson,et al. The Unified Software Development Process , 1999 .
[6] Xiaoming Wang,et al. Chapter 8 , 2003, The Sermons and Liturgy of Saint James.
[7] Sungyoung Lee,et al. Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments , 2005, EGC.
[8] Mario Piattini,et al. Engineering Process Based on Grid Use Cases for Mobile Grid Systems , 2008, ICSOFT.
[9] C.B. Westphall,et al. Grid-M: Middleware to Integrate Mobile Devices, Sensors and Grid Computing , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[10] Mario Piattini,et al. PSecGCM: Process for the Development of Secure Grid Computing based Systems with Mobile Devices , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[11] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[12] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[13] Jack Dongarra,et al. Scheduling in the Grid application development software project , 2004 .
[14] Ramesh Nagappan,et al. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management , 2005 .
[15] Janet Truitt Jenkins,et al. Pragmatic Security for Constrained Wireless Networks , 2007 .
[16] Anirban Chakrabarti,et al. Grid Computing Security: A Taxonomy , 2008, IEEE Security & Privacy.
[17] Mario Piattini,et al. Obtaining Security Requirements for a Mobile Grid System , 2009, Int. J. Grid High Perform. Comput..
[18] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[19] R. M. Kolonay. Grid interactive service-oriented programming environment , 2004 .
[20] Felix Bachmann,et al. Security and Survivability Reasoning Frameworks and Architectural Design Tactics , 2004 .
[21] Ian T. Foster,et al. Grid Services for Distributed System Integration , 2002, Computer.
[22] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[23] Jan Jürjens,et al. Towards Development of Secure Systems Using UMLsec , 2001, FASE.
[24] Marty Humphrey,et al. Security for Grids , 2005, Proceedings of the IEEE.
[25] Vladimir Getov,et al. Integrating Mobile Devices into the Grid: Design Considerations and Evaluation , 2005, Euro-Par.
[26] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[27] Jarek Nabrzyski,et al. Grid resource management: state of the art and future trends , 2004 .