Determining role rights from use cases
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
From object-oriented to goal-oriented requirements analysis
Communications of the ACM
Techniques for trusted software engineering
Proceedings of the 20th international conference on Software engineering
The unified software development process
The unified software development process
Object-oriented technology and computing systems re-engineering
Software engineering and middleware: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
A UML statecharts semantics with message-passing
Proceedings of the 2002 ACM symposium on Applied computing
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Dealing with Security Requirements During the Development of Information Systems
CAiSE '93 Proceedings of Advanced Information Systems Engineering
Secure Java Development with UML
Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security
Encapsulating Rules of Prudent Security Engineering
Revised Papers from the 9th International Workshop on Security Protocols
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
On the security of 3GPP networks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A UML statecharts semantics with message-passing
Proceedings of the 2002 ACM symposium on Applied computing
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Sound methods and effective tools for model-based security engineering with UML
Proceedings of the 27th international conference on Software engineering
Journal of Systems and Software
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Introducing mitigation use cases to enhance the scope of test cases
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Modeling security attacks with statecharts
Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS
Hi-index | 0.00 |
Today many software systems need to take into account security considerations. While Software Engineering has been quite successful in ensuring that systems satisfy non-functional requirements such as dependability, less work has been done wrt. security requirements.In this work we present a software engineering method aiming to facilitate secure systems development, which is based on an extension of UML called UMLsec.