Patterning Protection Profiles by UML for Security Specifications
暂无分享,去创建一个
[1] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[2] Duminda Wijesekera,et al. authUML: a three-phased framework to analyze access control specifications in use cases , 2003, FMSE '03.
[3] Gerard J. Holzmann,et al. Implementing statecharts in PROMELA/SPIN , 1998, Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques.
[4] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[5] T. C. Ting,et al. MAC and UML for secure software design , 2004, FMSE '04.
[6] Grady Booch,et al. Object-Oriented Analysis and Design with Applications , 1990 .
[7] Sophie Dupuy-Chessa,et al. An Overview of RoZ: A Tool for Integrating UML and Z Specifications , 2000, CAiSE.
[8] Pierre Castéran,et al. Interactive Theorem Proving and Program Development , 2004, Texts in Theoretical Computer Science An EATCS Series.
[9] Fausto Giunchiglia,et al. NUSMV: A New Symbolic Model Verifier , 1999, CAV.
[10] Jingde Cheng,et al. A security specification verification technique based on the international standard ISO/IEC 15408 , 2006, SAC '06.
[11] Craig Metz,et al. A One-Time Password System , 1996, RFC.
[12] Stephan Merz,et al. Model Checking , 2000 .
[13] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .