Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021‏ - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

An extensive systematic review on the model-driven development of secure systems

PH Nguyen, M Kramer, J Klein, Y Le Traon - Information and Software …, 2015‏ - Elsevier
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …

Design notations for secure software: a systematic literature review

A Van den Berghe, R Scandariato, K Yskout… - Software & Systems …, 2017‏ - Springer
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …

Requirements modeling languages for software product lines: A systematic literature review

S Sepúlveda, A Cravero, C Cachero - Information and Software Technology, 2016‏ - Elsevier
Abstract Context: Software product lines (SPLs) have reached a considerable level of
adoption in the software industry, having demonstrated their cost-effectiveness for …

Role based access control design using three-way formal concept analysis

CM Subramanian, AK Cherukuri, C Chelliah - International Journal of …, 2018‏ - Springer
Role based access control (RBAC) is one of the popular access control models. On
representing the policy behind RBAC, the literatures investigate the use of various …

VCU: the three dimensions of reuse

J Kienzle, G Mussbacher, O Alam, M Schöttle… - … Reuse: Bridging with …, 2016‏ - Springer
Reuse, enabled by modularity and interfaces, is one of the most important concepts in
software engineering. This is evidenced by an increasingly large number of reusable …

Introducing attribute-based access control to AUTOSAR

DK Kim, E Song, H Yu - 2016‏ - sae.org
Cyber security concerns in the automotive industry have been constantly increasing as
automobiles are more computerized and networked. AUTOSAR is the standard architecture …

A 4D‐Role Based Access Control Model for Multitenancy Cloud Platform

J Li, Z Liao, C Zhang, Y Shi - Mathematical Problems in …, 2016‏ - Wiley Online Library
Since more and more applications and services have been transferred from servers in the
B/S architecture to cloud, user access control has become a significant part in a multitenancy …

Building hybrid access control by configuring RBAC and MAC features

S Kim, DK Kim, L Lu, E Song - Information and Software Technology, 2014‏ - Elsevier
Abstract Context Role-Based Access Control (RBAC) and Mandatory Access Control (MAC)
are widely used access control models. They are often used together in domains where both …

Role based access control design using triadic concept analysis

CA Kumar, SC Mouliswaran, J Li… - Journal of Central South …, 2016‏ - Springer
Role based access control is one of the widely used access control models. There are
investigations in the literature that use knowledge representation mechanisms such as …