Author:
Martínez Salvador,Garcia-Alfaro Joaquin,Cuppens Frédéric,Cuppens-Boulahia Nora,Cabot Jordi
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Building secure software: how to avoid security problems the right way. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)
2. Firewall Reverse Engineering project web site (2013),
http://www.emn.fr/z-info/atlanmod/index.php/Firewall_Reverse_Engineering
3. Alam, M., Hafner, M., Breu, R.: Constraint based role based access control in the sectet-framework: A model-driven approach. J. Comput. Secur. 16(2), 223–260 (2008)
4. Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4), 381–420 (2004)
5. Bishop, M., Peisert, S.: Your security policy is what?? Technical report (2006)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vaultage: Automatic Generation of Secure Communication around Decentralised User-Managed Data Vaults.;The Journal of Object Technology;2022
2. Towards model-based development of decentralised peer-to-peer data vaults;Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings;2020-10-16
3. Model-based security analysis of feature-oriented software product lines;Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences;2018-11-05
4. Towards Model-Based Communication Control for the Internet of Things;Software Technologies: Applications and Foundations;2018
5. A feature-based survey of model view approaches;Software & Systems Modeling;2017-09-15