A model transformation semantics and analysis methodology for SecureUML
暂无分享,去创建一个
[1] Tobias Nipkow,et al. A Proof Assistant for Higher-Order Logic , 2002 .
[2] Achim D. Brucker,et al. A verification approach to applied system security , 2004, International Journal on Software Tools for Technology Transfer.
[3] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[4] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[5] Francesco Parisi-Presicce,et al. Access Control Specification in UML , 2007 .
[6] Heiko Mantel,et al. Information Flow Control and Applications - Bridging a Gap , 2001, FME.
[7] David Basin,et al. Model driven security: From UML models to access control infrastructures , 2006, TSEM.
[8] Jeannette M. Wing,et al. A behavioral notion of subtyping , 1994, TOPL.
[9] Achim D. Brucker,et al. The HOL-OCL Book , 2006 .
[10] Jan Jürjens,et al. Secure systems development with UML , 2004 .