A transformation contract to generate aspects from access control policies
暂无分享,去创建一个
[1] Manuel Clavel,et al. Equational Specification of UML + OCL Static Class Diagrams ? , 2006 .
[2] Jochen Malte Küster,et al. Definition and validation of model transformations , 2006, Software & Systems Modeling.
[3] Bart De Decker,et al. Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium , 2001, Network Security.
[4] Bart De Decker,et al. Security Through Aspect-Oriented Programming , 2001, Network Security.
[5] Martin Gogolla,et al. Model transformations? transformation models! , 2006, MoDELS'06.
[6] William G. Griswold,et al. An Overview of AspectJ , 2001, ECOOP.
[7] Jan Jüriens. Model-based security engineering with UML : Introducing security aspects , 2006 .
[8] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[9] Manuel Clavel,et al. ITP/OCL: A Rewriting-Based Validation Tool for UML+OCL Static Class Diagrams , 2006, AMAST.
[10] José Meseguer,et al. Order-Sorted Algebra I: Equational Deduction for Multiple Inheritance, Overloading, Exceptions and Partial Operations , 1992, Theor. Comput. Sci..
[11] David Basin,et al. Model driven security: From UML models to access control infrastructures , 2006, TSEM.
[12] Jan Jürjens,et al. Dynamic secure aspect modeling with UML: from models to code , 2005, MoDELS'05.
[13] David A. Basin,et al. Automated analysis of security-design models , 2009, Inf. Softw. Technol..
[14] 簡聰富,et al. 物件導向軟體之架構(Object-Oriented Software Construction)探討 , 1989 .
[15] Indrakshi Ray,et al. An aspect-based approach to modeling access control concerns , 2004, Inf. Softw. Technol..
[16] Yi Deng,et al. Applying Aspect-Orientation in Designing Security Systems: A Case Study , 2004, SEKE.
[17] Bertrand Meyer,et al. Object-Oriented Software Construction, 2nd Edition , 1997 .
[18] Narciso Martí-Oliet,et al. All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic , 2007, All About Maude.
[19] David A. Basin. Model driven security , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[20] Joaquin Miller,et al. MDA Guide Version 1.0.1 , 2003 .
[21] José Meseguer,et al. Specification and proof in membership equational logic , 2000, Theor. Comput. Sci..
[22] Viviane Torres da Silva,et al. Model-Driven Security in Practice: An Industrial Experience , 2008, ECMDA-FA.
[23] Steven A. Demurjian,et al. A formal enforcement framework for role-based access control using aspect-oriented programming , 2005, MoDELS'05.
[24] Ramaswamy Chandramouli,et al. Role-Based Access Control (2nd ed.) , 2007 .
[25] Christiano Braga. From Access Control Policies to an Aspect-Based Infrastructure: A Metamodel-Based Approach , 2008, MoDELS Workshops.
[26] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[27] Yijun Yu,et al. Automated Analysis of Permission-Based Security Using UMLsec , 2008, FASE.
[28] Bertrand Meyer,et al. Object-oriented software construction (2nd ed.) , 1997 .
[29] Maher Lamari,et al. Towards an automated test generation for the verification of model transformations , 2007, SAC '07.
[30] Kung Chen,et al. An Aspect-Oriented Approach to Declarative Access Control for Web Applications , 2006, APWeb.