Database security
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
MDA Explained: The Model Driven Architecture: Practice and Promise
MDA Explained: The Model Driven Architecture: Practice and Promise
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
EDOC '03 Proceedings of the 7th International Conference on Enterprise Distributed Object Computing
MDA Distilled
authUML: a three-phased framework to analyze access control specifications in use cases
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
P2I: An Innovative MDA Methodology for Embedded Real-Time System
DSD '05 Proceedings of the 8th Euromicro Conference on Digital System Design
A Component-Based UML Profile to Model Embedded Real-Time Systems Designed by the MDA Approach
RTCSA '05 Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Application MDA in a Conception Design Environment
IMSCCS '06 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 1 (IMSCCS'06) - Volume 01
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Modeling and performance analysis for security aspects
Science of Computer Programming - Special issue on quality system and software architectures
Model driven development of secure XML databases
ACM SIGMOD Record
A MDA based SoC Modeling Approach using UML and SystemC
CIT '06 Proceedings of the Sixth IEEE International Conference on Computer and Information Technology
Transform from Models to Service Description Based on MDA
APSCC '06 Proceedings of the 2006 IEEE Asia-Pacific Conference on Services Computing
A UML profile for multidimensional modeling in data warehouses
Data & Knowledge Engineering - Special issue: ER 2003
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Model Driven Development of Security Aspects
Electronic Notes in Theoretical Computer Science (ENTCS)
Developing secure data warehouses with a UML extension
Information Systems
Model transformation for object-relational database development
Proceedings of the 2007 ACM symposium on Applied computing
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Evaluation of MDA/PSM database model quality in the context of selected non-functional requirements
DEPCOS-RELCOMEX '07 Proceedings of the 2nd International Conference on Dependability of Computer Systems
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Model based development of access policies
International Journal on Software Tools for Technology Transfer (STTT)
Tools for secure systems development with UML
International Journal on Software Tools for Technology Transfer (STTT)
Using MDA to Support Hypermedia Document Sharing
ICSEA '07 Proceedings of the International Conference on Software Engineering Advances
Model Driven Development of Software Product Lines
QUATIC '07 Proceedings of the 6th International Conference on Quality of Information and Communications Technology
A Model-Driven Framework for Trusted Computing Based Systems
EDOC '07 Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference
Enterprise Modeling for Information System Development within MDA
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Model-based security analysis for mobile communications
Proceedings of the 30th international conference on Software engineering
A Linear time algorithm for deciding security
SFCS '76 Proceedings of the 17th Annual Symposium on Foundations of Computer Science
Performance analysis of security aspects by weaving scenarios extracted from UML models
Journal of Systems and Software
A constraint based role based access control in the SECTET a model-driven approach
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A Taxonomy of Model Transformation
Electronic Notes in Theoretical Computer Science (ENTCS)
ER'07 Proceedings of the 26th international conference on Conceptual modeling
A model-driven goal-oriented requirement engineering approach for data warehouses
ER'07 Proceedings of the 2007 conference on Advances in conceptual modeling: foundations and applications
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Secure Systems Development with UML
Secure Systems Development with UML
The webSA approach: applying model driven engineering to web applications
Journal of Web Engineering
Analysis-level classes from secure business processes through model transformations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
Portable secure identity management for software engineering
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Towards the secure modelling of OLAP users behaviour
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Building ISMS through the reuse of knowledge
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Systematic design of secure Mobile Grid systems
Journal of Network and Computer Applications
Challenges in model-based evolution and merging of access control policies
Proceedings of the 12th International Workshop on Principles of Software Evolution and the 7th annual ERCIM Workshop on Software Evolution
Tool support for UML-based specification and verification of role-based access control properties
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
International Journal of Information Security and Privacy
Not Ready for Prime Time: A Survey on Security in Model Driven Development
International Journal of Secure Software Engineering
Transforming and tracing reused requirements models to home automation models
Information and Software Technology
Hi-index | 0.00 |