Model driven security for process-oriented systems
Proceedings of the eighth ACM symposium on Access control models and technologies
MDA Explained: The Model Driven Architecture: Practice and Promise
MDA Explained: The Model Driven Architecture: Practice and Promise
Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Bridging the Gap between Software Development and Information Security
IEEE Security and Privacy
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Security Requirement with a UML 2.0 Profile
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Visual security protocol modeling
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
The Security Development Lifecycle
The Security Development Lifecycle
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Application of QVT for the Development of Secure Data Warehouses: A case study
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A Framework for the Development of Secure Data Warehouses based on MDA and QVT
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Applying Systematic Reviews to Diverse Study Types: An Experience Report
ESEM '07 Proceedings of the First International Symposium on Empirical Software Engineering and Measurement
A Model-Driven Framework for Trusted Computing Based Systems
EDOC '07 Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference
Security Requirements for the Rest of Us: A Survey
IEEE Software
Model-based security analysis for mobile communications
Proceedings of the 30th international conference on Software engineering
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Implementing Multidimensional Security into OLAP Tools
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Model-Driven Security in Practice: An Industrial Experience
ECMDA-FA '08 Proceedings of the 4th European conference on Model Driven Architecture: Foundations and Applications
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Editorial: Model-Driven Development for secure information systems
Information and Software Technology
An engineering process for developing Secure Data Warehouses
Information and Software Technology
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
Model-Driven Code Generation for Secure Smart Card Applications
ASWEC '09 Proceedings of the 2009 Australian Software Engineering Conference
Towards a Modernization Process for Secure Data Warehouses
DaWaK '09 Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery
Generating formal specifications for security-critical applications - A model-driven approach
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Security Analysis of a Biometric Authentication System Using UMLsec and JML
MODELS '09 Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Secure Systems Development with UML
Secure Systems Development with UML
Model-Driven Development Meets Security: An Evaluation of Current Approaches
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
A decade of model-driven security
Proceedings of the 16th ACM symposium on Access control models and technologies
Security in Model Driven Development: A Survey
ARES '11 Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
Towards a MOF/QVT-Based domain architecture for model driven security
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Towards a UML 2.0 extension for the modeling of security requirements in business processes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Model driven security for inter-organizational workflows in e-government
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Hi-index | 0.00 |
Model Driven Development MDD is by many considered a promising approach for software development. This article reports the results of a systematic survey to identify the state-of-the-art within the topic of security in model driven development, with a special focus on finding empirical studies. The authors provide an introduction to the major secure MDD initiatives, but the survey shows that there is a lack of empirical work on the topic. The authors conclude that better standardization initiatives and more empirical research in the field is necessary before it can be considered mature.