Towards Model Driven Architecture and Analysis of System of Systems Access Control
暂无分享,去创建一个
[1] John Klein,et al. A systematic review of system-of-systems architecture research , 2013, QoSA '13.
[2] Roy Kalawsky,et al. Using Architecture Patterns to Architect and Analyze Systems of Systems , 2013, CSER.
[3] Giuseppe De Pietro,et al. On Securing Communications among Federated Health Information Systems , 2012, SAFECOMP Workshops.
[4] Madjid Merabti,et al. Critical infrastructure protection: A 21st century challenge , 2011, 2011 International Conference on Communications and Information Technology (ICCIT).
[5] Mark W. Maier,et al. Architecting Principles for Systems‐of‐Systems , 1996 .
[6] Sandro Etalle,et al. A Semantic Security Framework for Systems of Systems , 2013, Int. J. Cooperative Inf. Syst..
[7] Judith S. Dahmann,et al. Security engineering in a system of systems environment , 2013, 2013 IEEE International Systems Conference (SysCon).
[8] Xiao Sun,et al. Bibliometric and social network analysis of the SoS field , 2014, 2014 9th International Conference on System of Systems Engineering (SOSE).
[9] Panayiotis Kotzanikolaou,et al. Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects , 2011, CRITIS.
[10] Deborah J. Bodeau. System-of-systems security engineering , 1994, Tenth Annual Computer Security Applications Conference.
[11] Irene Eusgeld,et al. "System-of-systems" approach for interdependent critical infrastructures , 2011, Reliab. Eng. Syst. Saf..
[12] David Llewellyn-Jones,et al. The challenges of secure and trustworthy service composition in the Future Internet , 2011, 2011 6th International Conference on System of Systems Engineering.
[13] Deborah L. Farroha,et al. Agile development for system of systems: Cyber security integration into information repositories architecture , 2011, 2011 IEEE International Systems Conference.
[14] Brian J. Sauser,et al. System of Systems - the meaning of of , 2006, 2006 IEEE/SMC International Conference on System of Systems Engineering.
[15] Robert K. Abercrombie,et al. Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure , 2013, CSIIRW '13.
[16] Eduardo Fernandez-Buglioni,et al. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns , 2013 .
[17] M. Janishidi. System of Systems - Innovations for 21st Century , 2008, 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems.
[18] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[19] Thomas Polacsek,et al. Formal Methods for Exchange Policy Specification , 2013, CAiSE.