Advances in Model-Driven Security
暂无分享,去创建一个
Jacques Klein | Yves Le Traon | Hans Vangheluwe | Moussa Amrani | Levi Lucio | Phu Hong Nguyen | Qin Zhang | H. Vangheluwe | Jacques Klein | Moussa Amrani | L. Lucio | P. Nguyen | Qin Zhang
[1] Jan Jürjens,et al. Model-based security analysis for mobile communications , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[2] Jan Jürjens,et al. Developing secure networked Web-based systems using model-based risk assessment and UMLsec , 2003, Tenth Asia-Pacific Software Engineering Conference, 2003..
[3] Robert B. France,et al. A Generic Approach for Automatic Model Composition , 2008, MoDELS.
[4] Hassan Gomaa,et al. Separating Application and Security Concerns in Modeling Software Product Lines , 2009 .
[5] Ruth Breu,et al. Sectet: an extensible framework for the realization of secure inter-organizational workflows , 2006, Internet Res..
[6] David A. Basin,et al. Automatic Generation of Smart, Security-Aware GUI Models , 2010, ESSoS.
[7] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[8] Mohammad Zulkernine,et al. A model-based aspect-oriented framework for building intrusion-aware software systems , 2009, Inf. Softw. Technol..
[9] Jacques Klein,et al. A Systematic Review of Model-Driven Security , 2013, 2013 20th Asia-Pacific Software Engineering Conference (APSEC).
[10] Bashar Nuseibeh,et al. Model-Based Security Engineering of Distributed Information Systems Using UMLsec , 2007, 29th International Conference on Software Engineering (ICSE'07).
[11] Gregor Kiczales,et al. Aspect-oriented programming , 1996, CSUR.
[12] Jacques Klein,et al. Aspect Model Unweaving , 2009, MoDELS.
[13] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[14] Jacques Klein,et al. Weaving Multiple Aspects in Sequence Diagrams , 2007, LNCS Trans. Aspect Oriented Softw. Dev..
[15] Egon Börger,et al. Java and the Java Virtual Machine: Definition, Verification, Validation , 2001 .
[16] Siobhán Clarke,et al. Aspect-oriented analysis and design - the theme approach , 2005, Addison Wesley object technology series.
[17] AMIR A. KHWAJA,et al. A Synthesis of Evaluation Criteria for Software Specifications and Specification Techniques , 2002, Int. J. Softw. Eng. Knowl. Eng..
[18] Jacques Klein,et al. Semantic-based weaving of scenarios , 2006, AOSD.
[19] Ruth Breu,et al. A constraint based role based access control in the SECTET a model-driven approach , 2006, PST.
[20] Ruth Breu,et al. Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET , 2006, PST.
[21] Jan Jürjens,et al. Model-Based Security Engineering with UML , 2004, FOSAD.
[22] M. Breu,et al. Model driven security for Web services (MDS4WS) , 2004, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..
[23] Ruth Breu,et al. Model based development of access policies , 2007, International Journal on Software Tools for Technology Transfer.
[24] Viviane Torres da Silva,et al. Model-Driven Security in Practice: An Industrial Experience , 2008, ECMDA-FA.
[25] Julio Cesar Sampaio do Prado Leite,et al. Non-functional requirements: from elicitation to modelling languages , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.
[26] Kurt Stenzel,et al. Generating formal specifications for security-critical applications - A model-driven approach , 2009, 2009 ICSE Workshop on Software Engineering for Secure Systems.
[27] Kurt Stenzel,et al. SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications , 2009, 2009 International Conference on Availability, Reliability and Security.
[28] João Araújo,et al. MATA: A Unified Approach for Composing UML Aspect Models Based on Graph Transformation , 2009, LNCS Trans. Aspect Oriented Softw. Dev..
[29] Christian Wagner,et al. Model-driven Security: from Theory to Application , 2012 .
[30] Siobhán Clarke,et al. Composition of Object-Oriented Software Design Models , 2001 .
[31] Li Yang,et al. Secure software architectures design by aspect orientation , 2005, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05).
[32] James R. Cordy,et al. Analysis of Model Transformations , 2012 .
[33] Hans Vangheluwe,et al. Addressing Security Requirements Through Multi-Formalism Modelling and Model Transformation , 2007, ICSOFT.
[34] Ulrich Lang,et al. Model Driven Security Management: Making Security Management Manageable in Complex Distributed Systems , 2008, MODSEC@MoDELS.
[35] Mario Piattini,et al. CIM to PIM Transformation: A Reality , 2007, CONFENIS.
[36] João Araújo,et al. Scenario modelling with aspects , 2004, IEE Proc. Softw..
[37] Jan Jürjens,et al. Towards Development of Secure Systems Using UMLsec , 2001, FASE.
[38] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[39] Jean-Marc Jézéquel,et al. Weaving executability into object-oriented meta-languages , 2005, MoDELS'05.
[40] Hélène Kirchner,et al. Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets , 2011, IEEE Transactions on Dependable and Secure Computing.
[41] Jan Jürjens. Formal Semantics for Interacting UML subsystems , 2002, FMOODS.
[42] Ivar Jacobson,et al. Aspect-oriented software development with use cases , 2005, Addison Wesley object technology series.
[43] Jean-Pierre Seifert,et al. A Model-Driven Framework for Trusted Computing Based Systems , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).
[44] Mario Piattini,et al. Designing secure databases , 2005, Inf. Softw. Technol..
[45] Thomas Neubauer,et al. Model-Driven Development Meets Security: An Evaluation of Current Approaches , 2011, 2011 44th Hawaii International Conference on System Sciences.
[46] Hartmut Ehrig,et al. Fundamentals of Algebraic Graph Transformation (Monographs in Theoretical Computer Science. An EATCS Series) , 1992 .
[47] Jacques Klein,et al. Aspect-Oriented Design with Reusable Aspect Models , 2010, LNCS Trans. Aspect Oriented Softw. Dev..
[48] Xavier Crégut,et al. A Framework to Formalise the MDE Foundations , 2007 .
[49] Michael Howard,et al. The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .
[50] Shane Sendall,et al. Model Transformation: The Heart and Soul of Model-Driven Software Development , 2003, IEEE Softw..
[51] Ruth Breu,et al. Model-Driven Configuration of SELinux Policies , 2009, OTM Conferences.
[52] Ruth Breu,et al. Model-Driven Security Engineering for Trust Management in SECTET , 2007, J. Softw..
[53] Jacques Klein,et al. Flexible model element introduction policies for aspect-oriented modeling , 2010, MODELS'10.
[54] Martin Gogolla,et al. Typing Model Transformations Using Tracts , 2012, ICMT@TOOLS.
[55] Jan Jürjens,et al. Security Analysis of a Biometric Authentication System Using UMLsec and JML , 2009, MoDELS.
[56] Ruth Breu,et al. Model Driven Security for Inter-organizational Workflows in e-Government , 2005, TCGOV.
[57] Pieter J. Mosterman,et al. Computer Automated Multi-Paradigm Modeling : An Introduction , 2000 .
[58] Bart De Decker,et al. A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System , 2008, EuroPKI.
[59] Mario Piattini,et al. Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases , 2007, BPM.
[60] Martin Gilje Jaatun,et al. Security in Model Driven Development: A Survey , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[61] Ruth Breu,et al. Modelling inter-organizational workflow security in a peer-to-peer environment , 2005, IEEE International Conference on Web Services (ICWS'05).
[62] Levi Lucio,et al. A technique for automatic validation of model transformations , 2010, MODELS'10.
[63] Jean Bézivin,et al. Model Driven Engineering: An Emerging Technical Space , 2005, GTTSE.
[64] Zahir Tari,et al. On the Move to Meaningful Internet Systems. OTM 2018 Conferences , 2018, Lecture Notes in Computer Science.
[65] Colin Atkinson,et al. Orthographic Service Modeling , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.
[66] Bart De Decker,et al. Privacy-Preserving Telemonitoring for eHealth , 2009, DBSec.
[67] Torsten Lodderstedt,et al. Model driven security from UML models to access control architectures , 2003 .
[68] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[69] Martin Gogolla,et al. Verification of ATL Transformations Using Transformation Models and Model Finders , 2012, ICFEM.
[70] David A. Basin,et al. Automated analysis of security-design models , 2009, Inf. Softw. Technol..
[71] Basit Shafiq,et al. A role-based access control policy verification framework for real-time systems , 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.
[72] José Ambrosio Toval Álvarez,et al. ModelSec: A Generative Architecture for Model-Driven Security , 2009, J. Univers. Comput. Sci..
[73] Michael Hafner,et al. Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet , 2008, MoDELS.
[74] Jan Jürjens. Code security analysis of a biometric authentication system using automated theorem provers , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[75] Jan Jürjens. Sound methods and effective tools for model-based security engineering with UML , 2005, ICSE.
[76] Jan Jürjens. Developing Secure Embedded Systems: Pitfalls and How to Avoid Them , 2007, 29th International Conference on Software Engineering (ICSE'07 Companion).
[77] Kurt Stenzel,et al. Formal Verification of Application-Specific Security Properties in a Model-Driven Approach , 2010, ESSoS.
[78] Kurt Stenzel,et al. Incremental development of large, secure smart card applications , 2012, MDsec '12.
[79] Juan de Lara,et al. AToM3: A Tool for Multi-formalism and Meta-modelling , 2002, FASE.
[80] Cristina V. Lopes,et al. Aspect-oriented programming , 1999, ECOOP Workshops.
[81] R. France,et al. Aspect-oriented approach to early design modelling , 2004, IEE Proc. Softw..
[82] Jan Jürjens,et al. Systematic Development of UMLsec Design Models Based on Security Requirements , 2011, FASE.
[83] Ruth Breu,et al. A Framework for Modeling Restricted Delegation in Service Oriented Architecture , 2006, TrustBus.
[84] David A. Basin,et al. A decade of model-driven security , 2011, SACMAT '11.
[85] José de la Peña Muñoz. Information Security Industry: State of the Art , 2008, ISSE.
[86] Ruth Breu,et al. Security engineering for service-oriented architectures , 2008 .
[87] Anneke Kleppe,et al. MDA explained - the Model Driven Architecture: practice and promise , 2003, Addison Wesley object technology series.
[88] Jürgen Dingel,et al. A Tridimensional Approach for Studying the Formal Verification of Model Transformations , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[89] Ruth Breu,et al. Model-Driven Security Engineering of Service Oriented Systems , 2008, UNISCON.
[90] Ruth Breu,et al. Towards a MOF/QVT-Based domain architecture for model driven security , 2006, MoDELS'06.
[91] David A. Basin,et al. Model driven security for process-oriented systems , 2003, SACMAT '03.
[92] Robert B. France,et al. Directives for Composing Aspect-Oriented Design Class Models , 2006, LNCS Trans. Aspect Oriented Softw. Dev..
[93] Brice Morin,et al. Taming Dynamically Adaptive Systems using models and aspects , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[94] Mike Papadakis,et al. Mutation based test case generation via a path selection strategy , 2012, Inf. Softw. Technol..
[95] Jacques Klein,et al. Achieving Practical Genericity in Model Weaving through Extensibility , 2013, ICMT.
[96] Thomas Cottenier. The Motorola WEAVR : Model Weaving in a Large Industrial Context , 2006 .
[97] Eugene Syriani,et al. A multi-paradigm foundation for model transformation language engineering , 2011 .
[98] Steve Cook,et al. Domain-Specific Development with Visual Studio DSL Tools , 2007 .
[99] Jürgen Dingel,et al. Model transformation testing: the state of the art , 2012, AMT '12.
[100] Jacques Klein,et al. A generic weaver for supporting product lines , 2008, EA '08.
[101] Claudia Steinberger,et al. Information Systems and e-Business Technologies , 2008 .
[102] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[103] David Basin,et al. Model driven security: From UML models to access control infrastructures , 2006, TSEM.
[104] Jan Jürjens. Sound methods and effective tools for model-based security engineering with UML , 2005, ICSE '05.
[105] Kurt Stenzel,et al. Model-Driven Code Generation for Secure Smart Card Applications , 2009, 2009 Australian Software Engineering Conference.
[106] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[107] Gerti Kappel,et al. Automated verification of model transformations based on visual contracts , 2013, Automated Software Engineering.