[BOK][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

Directives for composing aspect-oriented design class models

YR Reddy, S Ghosh, RB France, G Straw… - Transactions on aspect …, 2006 - Springer
An aspect-oriented design model consists of a set of aspect models and a primary model.
Each aspect model describes a feature that crosscuts elements in the primary model. Aspect …

Using UML to visualize role-based access control constraints

I Ray, N Li, R France, DK Kim - … of the ninth ACM symposium on Access …, 2004 - dl.acm.org
Organizations use Role-Based Access Control (RBAC) to protect information resources from
unauthorized access. We propose an approach, based on the Unified Modeling Language …

A pattern system for access control

T Priebe, EB Fernández, JI Mehlau… - Research Directions in …, 2004 - Springer
In order to develop trustworthy information systems, security aspects should be considered
from the early project stages. This is particularly true for authorization and access control …

[BOK][B] Database and applications security: Integrating information security and data management

B Thuraisingham - 2005 - taylorfrancis.com
This is the first book to provide an in-depth coverage of all the developments, issues and
challenges in secure databases and applications. It provides directions for data and …

120 Domain-Specific Languages for Security

M Krausz, S Peldszus, F Regazzoni, T Berger… - arxiv preprint arxiv …, 2024 - arxiv.org
Security engineering, from security requirements engineering to the implementation of
cryptographic protocols, is often supported by domain-specific languages (DSLs) …

MAC and UML for secure software design

T Doan, S Demurjian, TC Ting, A Ketterl - … of the 2004 ACM workshop on …, 2004 - dl.acm.org
Security must be a first class citizen in the design of large scale, interacting, software
applications, at early and all stages of the lifecycle, for accurate and precise policy definition …

UACML: Unified access control modeling language

N Slimani, H Khambhammettu, K Adi… - 2011 4th IFIP …, 2011 - ieeexplore.ieee.org
Incorporating security requirements into system design models is receiving increasing
interest. Access control requirements are an important part of overall system security …

Security patterns for physical access control systems

EB Fernandez, J Ballesteros… - Data and Applications …, 2007 - Springer
Physical security has received increased attention after 9/11. However, access control to
physical units has not been explored much. On the other hand, there is a rich literature on …

Scenario-based static analysis of UML class models

L Yu, RB France, I Ray - … , MoDELS 2008, Toulouse, France, September 28 …, 2008 - Springer
Static analysis tools, such as OCLE and USE, can be used to analyze structural properties of
class models. The USE tool also provides support for analyzing specified operations through …