Abstract is missing.
- Towards an Integrated Framework for Model-Driven Security EngineeringJordi Cabot, Nicola Zannone. [doi]
- A Server Side SOA Meta Model for Assigning Aspect ServicesAndreas Ganser, Stefan Hurtz, Horst Lichter. [doi]
- A Security Domain Model for Implementing Trusted Subject BehaviorsAlan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin. [doi]
- SECTISSIMO: A Platform-Independent Framework for Security ServicesMukhtiar Memon, Michael Hafner, Ruth Breu. [doi]
- Incorporating Security Requirements from Legal Regulations into UMLsec modelShareeful Islam, Jan Jürjens. [doi]
- Experiences Threat Modeling at MicrosoftAdam Shostack. [doi]
- On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic OrganizationsTrajce Dimkov, Qiang Tang 0001, Pieter H. Hartel. [doi]
- Transforming Security Audit Requirements into a Software ArchitectureKoen Yskout, Bart De Win, Wouter Joosen. [doi]
- Model Driven Security Management: Making Security Management Manageable in Complex Distributed SystemsUlrich Lang, Rudolf Schreiner. [doi]
- Specifying Security Aspects in UML ModelsKarine Peralta, Alex M. S. Orozco, Avelino F. Zorzo, Flavio Oliveira. [doi]
- SPML: A Visual Approach for Modeling Firewall ConfigurationsKleber Manrique Trevisani, Rogério Eduardo Garcia. [doi]
- Towards a Measurement Framework for Security Risk ManagementNicolas Mayer, Eric Dubois 0001, Raimundas Matulevicius, Patrick Heymans. [doi]
- Mutating DAC and MAC Security Policies: A Generic Metamodel Based ApproachTejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon. [doi]
- Modeling Security Protocols using UML2Alain Beaulieu, Greg Phillips, Sandra Smith. [doi]
- Curriculum for Modeling Security: Experiences and Lessons LearnedHaralambos Mouratidis. [doi]
- Automatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA ApproachCarlos Blanco, Ignacio García, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. [doi]
- IT Security Risk Analysis based on Business Process Models enhanced with Security RequirementsStefan Taubenberger, Jan Jürjens. [doi]
- Modeling and Assessment of Systems SecurityJonas Hallberg, Johan E. Bengtsson, Niklas Hallberg. [doi]
- Using Common Criteria as Reusable Knowledge in Security Requirements ElicitationMotoshi Saeki, Haruhiko Kaiya. [doi]