Barbed Model-Driven Software Development: A Case Study
暂无分享,去创建一个
[1] Mikael Buchholtz,et al. For-LySa: UML for Authentication Analysis , 2004, Global Computing.
[2] LerouxD.,et al. Rational software architect , 2006 .
[3] Dániel Varró,et al. VPM: A visual, precise and multilevel metamodeling framework for describing mathematical domains and UML (The Mathematics of Metamodeling is Metamodeling Mathematics) , 2003, Software & Systems Modeling.
[4] Stephen Gilmore,et al. End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform , 2005, FM.
[5] Matt Brown,et al. Invited talk , 2007 .
[6] Maurice H. ter Beek,et al. An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications , 2007, FMICS.
[7] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[8] Massimo Bartoletti,et al. Secure Service Composition , 2006 .
[9] A. Fantechi,et al. An action / state-based model-checking approach for the analysis of an asynchronous protocol for Service-Oriented Applications ? , 2007 .
[10] Dániel Varró,et al. Advanced model transformation language constructs in the VIATRA2 framework , 2006, SAC.
[11] Gabriele Taentzer,et al. Generation of visual editors as eclipse plug-ins , 2005, ASE.
[12] Gian Luigi Ferrari,et al. Planning and verifying service composition , 2009, J. Comput. Secur..
[13] Jane Hillston,et al. Process algebras for quantitative analysis , 2005, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05).
[14] Gian Luigi Ferrari,et al. Security Issues in Service Composition , 2006, FMOODS.
[15] Stuart Kent,et al. Model Driven Engineering , 2002, IFM.
[16] Donald Sannella,et al. Essential concepts of algebraic specification and program development , 1997, Formal Aspects of Computing.
[17] Jan Juerjens,et al. Automated Theorem Proving for Cryptographic Protocols with Automatic Attack Generation , 2004 .
[18] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[19] J. Cheney,et al. A sequent calculus for nominal logic , 2004, LICS 2004.
[20] Flemming Nielson,et al. Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[21] Hisham M. Haddad. Proceedings of the 2006 ACM symposium on Applied computing , 2006, SAC.
[22] Renato Baserga,et al. Politically correct , 1995, Nature.
[23] Gian Luigi Ferrari,et al. Types and Effects for Resource Usage Analysis , 2007, FoSSaCS.
[24] Douglas C. Schmidt,et al. Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.