Model-Driven Security Patterns Application Based on Dependences among Patterns
暂无分享,去创建一个
Hironori Washizaki | Nobukazu Yoshioka | Yoshiaki Fukazawa | Atsuto Kubo | Yuki Shiroma | N. Yoshioka | H. Washizaki | Y. Fukazawa | A. Kubo | Yuki Shiroma
[1] Axel Uhl,et al. Model-Driven Architecture , 2002, OOIS Workshops.
[2] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[3] Markus Schumacher,et al. Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.
[4] Markus Schumacher. 8. A Theoretical Model for Security Patterns , 2003 .
[5] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[6] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[7] Atsuhiro Takasu,et al. Extracting Relations among Embedded Software Design Patterns , 2005, Trans. SDPS.
[8] Ketil Stølen,et al. What is model driven architecture , 2003 .
[9] Till Dörges,et al. From security patterns to implementation using petri nets , 2008, SESS '08.
[10] Hironori Washizaki,et al. A survey on security patterns , 2008 .
[11] Yijun Yu,et al. Enforcing a security pattern in stakeholder goal models , 2008, QoP '08.