Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BOK][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
Directives for composing aspect-oriented design class models
An aspect-oriented design model consists of a set of aspect models and a primary model.
Each aspect model describes a feature that crosscuts elements in the primary model. Aspect …
Each aspect model describes a feature that crosscuts elements in the primary model. Aspect …
Using UML to visualize role-based access control constraints
Organizations use Role-Based Access Control (RBAC) to protect information resources from
unauthorized access. We propose an approach, based on the Unified Modeling Language …
unauthorized access. We propose an approach, based on the Unified Modeling Language …
A pattern system for access control
In order to develop trustworthy information systems, security aspects should be considered
from the early project stages. This is particularly true for authorization and access control …
from the early project stages. This is particularly true for authorization and access control …
[BOK][B] Database and applications security: Integrating information security and data management
B Thuraisingham - 2005 - taylorfrancis.com
This is the first book to provide an in-depth coverage of all the developments, issues and
challenges in secure databases and applications. It provides directions for data and …
challenges in secure databases and applications. It provides directions for data and …
120 Domain-Specific Languages for Security
Security engineering, from security requirements engineering to the implementation of
cryptographic protocols, is often supported by domain-specific languages (DSLs) …
cryptographic protocols, is often supported by domain-specific languages (DSLs) …
MAC and UML for secure software design
T Doan, S Demurjian, TC Ting, A Ketterl - … of the 2004 ACM workshop on …, 2004 - dl.acm.org
Security must be a first class citizen in the design of large scale, interacting, software
applications, at early and all stages of the lifecycle, for accurate and precise policy definition …
applications, at early and all stages of the lifecycle, for accurate and precise policy definition …
UACML: Unified access control modeling language
N Slimani, H Khambhammettu, K Adi… - 2011 4th IFIP …, 2011 - ieeexplore.ieee.org
Incorporating security requirements into system design models is receiving increasing
interest. Access control requirements are an important part of overall system security …
interest. Access control requirements are an important part of overall system security …
Security patterns for physical access control systems
EB Fernandez, J Ballesteros… - Data and Applications …, 2007 - Springer
Physical security has received increased attention after 9/11. However, access control to
physical units has not been explored much. On the other hand, there is a rich literature on …
physical units has not been explored much. On the other hand, there is a rich literature on …
Scenario-based static analysis of UML class models
Static analysis tools, such as OCLE and USE, can be used to analyze structural properties of
class models. The USE tool also provides support for analyzing specified operations through …
class models. The USE tool also provides support for analyzing specified operations through …