@article{Reznik2007,
author = {Reznik, Julia and Ritter, Tom and Schreiner, Rudolf and Lang, Ulrich},
doi = {10.1016/j.entcs.2006.10.016},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Model Driven Development of Security Aspects.pdf:pdf},
issn = {15710661},
journal = {Electronic Notes in Theoretical \ldots},
keywords = {mda,roles,security aspects},
month = apr,
number = {2},
pages = {65--79},
title = {{Model driven development of security aspects}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S157106610700148X http://www.sciencedirect.com/science/article/pii/S157106610700148X},
volume = {163},
year = {2006}
}
@article{Jurjens2004,
author = {Jurjens, J},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Jurjens - 2004 - Developing high-assurance secure systems with UML a smartcard-based purchase protocol.pdf:pdf},
journal = {High Assurance Systems Engineering, 2004. \ldots},
title = {{Developing high-assurance secure systems with UML: a smartcard-based purchase protocol}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1281747},
year = {2004}
}
@incollection{Architecture,
author = {{Alam, Muhammad; Breu}, Ruth},
booktitle = {Security Engineering for Service-Oriented Architectures},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Modeling Security Critical SOA Applications.pdf:pdf},
pages = {27},
title = {{Modeling Security Critical SOA Applications}},
year = {2009}
}
@article{Alam2006a,
author = {Alam, Muhammad and Hafner, Michael and Breu, Ruth and Unterthiner, Stefan},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/A Framework for Modeling Restricted Delegation in Service Oriented Architecture.pdf:pdf},
journal = {Trust and Privacy in Digital \ldots},
pages = {142--151},
title = {{A framework for modeling restricted delegation in service oriented architecture}},
url = {http://www.springerlink.com/index/2447U68872383782.pdf},
year = {2006}
}
@article{Mouelhi2008,
author = {Mouelhi, Tejeddine and Fleurey, Franck and Baudry, Benoit and Traon, Yves Le},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/A Model-Based Framework for Security Policy Specification, Deployment and Testing.pdf:pdf},
journal = {Model Driven Engineering \ldots},
keywords = {metamodeling,model-driven engineering methodology,security},
number = {1},
pages = {537--552},
title = {{A model-based framework for security policy specification, deployment and testing}},
url = {http://www.springerlink.com/index/H3L72633083U171K.pdf},
year = {2008}
}
@article{Memon2012,
author = {Memon, Mukhtiar and Menghwar, GD},
doi = {10.1007/s10270-012-0268-6},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Security modeling for service-oriented systems using security pattern refinement approach.pdf:pdf},
issn = {1619-1366},
journal = {\ldots and Systems Modeling},
keywords = {model transformation,model-driven security,security patterns,soa security},
month = aug,
title = {{Security modeling for service-oriented systems using security pattern refinement approach}},
url = {http://www.springerlink.com/index/10.1007/s10270-012-0268-6 http://www.springerlink.com/index/j0106438g146g264.pdf},
year = {2012}
}
@article{Alam2006,
author = {Alam, M. and Breu, R. and Hafner, M.},
doi = {10.1109/ARES.2006.84},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Alam, Breu, Hafner - 2006 - Modeling permissions in a (UX) ML world.pdf:pdf},
isbn = {0-7695-2567-9},
journal = {\ldots . ARES 2006. The First International \ldots},
pages = {8 pp.--692},
publisher = {Ieee},
title = {{Modeling permissions in a (U/X) ML world}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1625374 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1625374},
year = {2006}
}
@article{Moebius2010,
author = {Moebius, Nina and Stenzel, Kurt and Reif, Wolfgang},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureMDD/Formal Verification of Application-Specific Security Properties in a Model-Driven Approach.pdf:pdf},
pages = {166--181},
title = {{Formal Verification of Application-Specific Security Properties in a Model-Driven Approach Example : A Copycard Application}},
year = {2010}
}
@article{Basin2003,
address = {New York, New York, USA},
author = {Basin, David and Doser, J\"{u}rgen and Lodderstedt, Torsten},
doi = {10.1145/775423.775425},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Basin, Doser, Lodderstedt - 2003 - Model driven security for process-oriented systems.pdf:pdf},
isbn = {1581136811},
journal = {\ldots of the eighth ACM symposium on \ldots},
keywords = {metamodeling,model driven architecture,rbac,security},
pages = {100},
publisher = {ACM Press},
title = {{Model driven security for process-oriented systems}},
url = {http://portal.acm.org/citation.cfm?doid=775412.775425 http://dl.acm.org/citation.cfm?id=775425},
year = {2003}
}
@article{Houmb2003,
author = {Houmb, SH and Jurjens, J},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Houmb, Jurjens - 2003 - Developing secure networked web-based systems using model-based risk assessment and UMLsec.pdf:pdf},
journal = {Software Engineering Conference, 2003 \ldots},
title = {{Developing secure networked web-based systems using model-based risk assessment and UMLsec}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1254404},
year = {2003}
}
@article{Soler2007a,
author = {Soler, Emilio and Trujillo, Juan},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Soler, Trujillo - 2007 - A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses.pdf:pdf},
isbn = {0769527752},
journal = {\ldots and Security, 2007. \ldots},
number = {1},
title = {{A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4159859},
volume = {3},
year = {2007}
}
@article{Mouratidis2009,
author = {Mouratidis, Haralambos and Sunyaev, Ali and Jurjens, Jan},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/UMLsec/Secure Information Systems Engineering Experiences and Lessons Learned from Two Health Care Projects.pdf:pdf},
journal = {\ldots Information Systems Engineering},
pages = {231--245},
title = {{Secure information systems engineering: experiences and lessons learned from two health care projects}},
url = {http://www.springerlink.com/index/f67347v17657j6r4.pdf},
year = {2009}
}
@article{Kim2004,
author = {Kim, DK and Ray, Indrakshi and France, Robert and Li, Na},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Modeling Role-Based Access Control Using Parameterized UML Models.pdf:pdf},
journal = {Fundamental Approaches to Software \ldots},
number = {1},
pages = {180--193},
title = {{Modeling role-based access control using parameterized UML models}},
url = {http://www.springerlink.com/index/X0D1VP7XYHXTJ2JY.pdf},
year = {2004}
}
@article{Burt2003,
author = {Burt, C.C. and Bryant, B.R. and Raje, R.R.},
doi = {10.1109/EDOC.2003.1233846},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Burt et al. - 2003 - Model driven security unification of authorization models for fine-grain access control.pdf:pdf},
isbn = {0-7695-1994-6},
journal = {Enterprise Distributed \ldots},
pages = {159--171},
publisher = {IEEE Comput. Soc},
title = {{Model driven security: unification of authorization models for fine-grain access control}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1233846 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1233846},
year = {2003}
}
@article{Lang2007,
author = {Lang, Ulrich and Schreiner, Rudolf},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Model Driven Security for Agile SOA-Style Environments.pdf:pdf},
journal = {Securing Electronic Business Processes, \ldots},
pages = {147--156},
title = {{Model Driven Security for Agile SOA-Style Environments'}},
url = {http://books.google.com/books?hl=en\&lr=\&id=7V9kFCffnJ4C\&oi=fnd\&pg=PA147\&dq=Model+Driven+Security+for+Agile+SOA-Style+Environments\&ots=jHvHm2gw5P\&sig=Udn-4KaiG-5\_SHfrq-1nVpPYx6Q http://books.google.com/books?hl=en\&lr=\&id=7V9kFCffnJ4C\&oi=fnd\&pg=PA147\&dq=Model+Driven+Security+for+Agile+SOA-Style+Environments\%27\&ots=jHvHm2iw3P\&sig=SKm5sOPcCFnN9KvzHm\_T9XrkN28 http://books.google.com/books?hl=en\&lr=\&id=7V9kFCffnJ4C\&oi=fnd\&pg=PA147\&dq=Model+Driven+Security+for+Agile+SOA-Style+Environments\&ots=jHvHo0crY},
year = {2007}
}
@article{Brucker2006,
author = {Brucker, A and Doser, J and Wolff, B},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Brucker - 2006 - A Model Transformation Semantics and Analysis Methodology for SecureUML.pdf:pdf},
journal = {Model Driven Engineering Languages and \ldots},
pages = {306--320},
title = {{A model transformation semantics and analysis methodology for SecureUML}},
url = {http://www.springerlink.com/index/Q70VQG563JN80282.pdf},
year = {2006}
}
@article{Ahn2007,
author = {Ahn, GJ and Hu, H},
doi = {10.1145/1266840.1266875},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Towards realizing a formal RBAC model in real systems.pdf:pdf},
isbn = {9781595937452},
journal = {Proceedings of the 12th ACM symposium on Access \ldots},
keywords = {access control,code,model validation,policy specification},
pages = {215},
title = {{Towards realizing a formal RBAC model in real systems}},
url = {http://dl.acm.org/citation.cfm?id=1266840.1266875},
year = {2007}
}
@incollection{Policies,
author = {Policies, Basic Security and Confidentiality, Security Objectives and Architecture, Reference and Policies, Security},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Extending Sectet Advanced Security Policy Modeling.pdf:pdf},
title = {{Extending Sectet : Advanced Security Policy}}
}
@article{Moebius2009,
author = {Moebius, Nina and Stenzel, Kurt},
doi = {10.1109/ASWEC.2009.15},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureMDD/Model-Driven Code Generation for Secure Smart Card Applications.pdf:pdf},
isbn = {978-0-7695-3599-9},
journal = {Software Engineering \ldots},
keywords = {code generation,java card,model-driven software devel-,opment,security,uml},
pages = {44--53},
publisher = {Ieee},
title = {{Model-Driven Code Generation for Secure Smart Card Applications}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5076626 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5076626},
year = {2009}
}
@article{Blanco2009a,
author = {Blanco, Carlos},
doi = {10.1109/ARES.2009.67},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Blanco - 2009 - Including Security Rules support in an MDA approach for Secure DWs.pdf:pdf},
isbn = {978-1-4244-3572-2},
journal = {\ldots and Security, 2009. \ldots},
pages = {516--521},
publisher = {Ieee},
title = {{Including Security Rules support in an MDA approach for Secure DWs}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5066519 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5066519},
year = {2009}
}
@article{Villarroel,
author = {Villarroel, Rodolfo and Soler, Emilio},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureDataWarehouse/Using UML packages for designing secure data warehouses.pdf:pdf},
journal = {\ldots Science and Its \ldots},
pages = {1024--1034},
title = {{Using UML packages for designing secure data warehouses}},
url = {http://www.springerlink.com/index/L4M44364U756630R.pdf},
year = {2006}
}
@article{Hatebur2011,
author = {Hatebur, Denis and Heisel, M and J\"{u}rjens, J and Schmidt, H},
doi = {10.1007/978-3-642-19811-3\_17},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/UMLsec/Systematic Development of UMLsec Design Models Based on Security Requirements.pdf:pdf},
isbn = {978-3-642-19810-6},
issn = {0302-9743},
journal = {Fundamental Approaches to \ldots},
pages = {232--246},
title = {{Systematic development of UMLsec design models based on security requirements}},
url = {http://www.springerlink.com/index/G715287T0231626M.pdf},
volume = {6603},
year = {2011}
}
@article{Menzel2010,
author = {Menzel, Michael and Meinel, Christoph},
doi = {10.1109/SCC.2010.63},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Menzel, Meinel - 2010 - SecureSOA Modelling Security Requirements for Service-Oriented Architectures.pdf:pdf},
isbn = {978-1-4244-8147-7},
journal = {Services Computing (SCC), 2010 IEEE \ldots},
month = jul,
pages = {146--153},
publisher = {Ieee},
title = {{SecureSOA Modelling Security Requirements for Service-Oriented Architectures}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5557226 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5557226},
year = {2010}
}
@article{Alam2007a,
author = {Alam, Muhammad},
doi = {10.1007/978-3-540-69489-2\_34},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Model driven security engineering for the realization of dynamic security requirements in collaborative systems.pdf:pdf},
isbn = {978-3-540-69488-5},
journal = {Models in Software Engineering},
pages = {278--287},
title = {{Model driven security engineering for the realization of dynamic security requirements in collaborative systems}},
url = {http://www.springerlink.com/index/2222521763014276.pdf},
volume = {4364},
year = {2007}
}
@article{Braga2009,
author = {Braga, Christiano},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureUML/From Access Control Policies to an Aspect-Based Infrastructure A Metamodel-Based Approach.pdf:pdf},
journal = {Models in Software Engineering},
pages = {243--256},
title = {{From access control policies to an aspect-based infrastructure: A metamodel-based approach}},
url = {http://www.springerlink.com/index/HW60L00688T22280.pdf},
year = {2009}
}
@article{Basin2006a,
author = {Basin, D and Doser, J and Lodderstedt, T},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Basin, Doser, Lodderstedt - 2006 - Model driven security From UML models to access control infrastructures.pdf:pdf},
journal = {ACM Transactions on Software \ldots},
number = {1},
pages = {39--91},
title = {{Model driven security: From UML models to access control infrastructures}},
url = {http://dl.acm.org/citation.cfm?id=1125810},
volume = {15},
year = {2006}
}
@article{Hafner2005,
author = {Hafner, Michael and Breu, R},
doi = {10.1007/11557432\_4},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Hafner, Breu - 2005 - Realizing model driven security for inter-organizational workflows with ws-cdl and uml 2.0.pdf:pdf},
isbn = {978-3-540-29010-0},
issn = {0302-9743},
journal = {Model Driven Engineering Languages and Systems},
pages = {39--53},
title = {{Realizing model driven security for inter-organizational workflows with ws-cdl and uml 2.0}},
url = {http://www.springerlink.com/index/LX484853723607J6.pdf},
volume = {3713},
year = {2005}
}
@article{Wolter2009,
author = {Wolter, Christian and Menzel, Michael and Schaad, Andreas},
doi = {10.1016/j.sysarc.2008.10.002},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Model-driven business process security requirement specification.pdf:pdf},
issn = {13837621},
journal = {Journal of Systems \ldots},
keywords = {web service security},
month = apr,
number = {4},
pages = {211--223},
publisher = {Elsevier B.V.},
title = {{Model-driven business process security requirement specification}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S1383762108001471 http://www.sciencedirect.com/science/article/pii/S1383762108001471},
volume = {55},
year = {2009}
}
@article{Eby2007,
author = {Eby, Matthew and Werner, Jan},
doi = {10.1109/ECBS.2007.45},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Eby, Werner - 2007 - Integrating security modeling into embedded system design.pdf:pdf},
isbn = {0-7695-2772-8},
journal = {Engineering of Computer- \ldots},
month = mar,
pages = {221--228},
publisher = {Ieee},
title = {{Integrating security modeling into embedded system design}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4148937 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4148937},
year = {2007}
}
@article{Jan2011,
author = {J\"{u}rjens, J and Marchal, L and Ochoa, M and Schmidt, H},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/JanJurjen-UMLsec-Secure Systems Development with UML/Incremental Security Verification for Evolving UMLsec models.pdf:pdf},
journal = {Modelling Foundations and \ldots},
pages = {52--68},
title = {{Incremental security verification for evolving UMLsec models}},
url = {http://www.springerlink.com/index/E561908877772235.pdf},
year = {2011}
}
@article{Jurjens2002,
author = {J\"{u}rjens, J},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/ManualSearch/UMLsecExtendingUML4SecureSystemsDevelopment.pdf:pdf},
journal = {«UML» 2002—The Unified Modeling Language},
title = {{UMLsec: Extending UML for secure systems development}},
url = {http://onlinelibrary.wiley.com/doi/10.1002/cbdv.200490137/abstract http://www.springerlink.com/index/JY1V4KYWFMLECV0B.pdf},
year = {2002}
}
@article{Basin2007,
author = {Basin, David and Clavel, Manuel and Doser, J and Egea, Marina},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Basin, Clavel, Egea - 2007 - A Metamodel-Based Approach for Analyzing Security-Design Models.pdf:pdf},
journal = {Model Driven Engineering \ldots},
pages = {420--435},
title = {{A metamodel-based approach for analyzing security-design models}},
url = {http://www.springerlink.com/index/L35631R3X177256K.pdf},
year = {2007}
}
@article{Koch2005,
author = {Koch, Manuel and Pauls, Karl},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Koch, Pauls - 2005 - An access control language for dynamic systems–model-driven development and verification.pdf:pdf},
journal = {SDL 2005: Model Driven},
pages = {16--31},
title = {{An access control language for dynamic systems–model-driven development and verification}},
url = {http://www.springerlink.com/index/M9VTKGVVU3EKAPBT.pdf},
year = {2005}
}
@article{Jorjens2002,
author = {J\"{u}rjens, J},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/J\"{u}rjens - 2002 - Using UMLsec and goal trees for secure systems development.pdf:pdf},
isbn = {1581134452},
journal = {Proceedings of the 2002 ACM symposium on Applied \ldots},
keywords = {formal semantics,goal trees,secure systems development,uml,umlsec,unified modeling language},
pages = {1026--1030},
title = {{Using UMLsec and goal trees for secure systems development}},
url = {http://dl.acm.org/citation.cfm?id=508791.508990},
year = {2002}
}
@article{Clavel2008,
author = {Clavel, Manuel and da Silva, V and Braga, Christiano and Egea, Marina},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Clavel et al. - 2008 - Model-Driven Security in Practice An Industrial Experience.pdf:pdf},
journal = {Model Driven Architecture– \ldots},
pages = {326--337},
title = {{Model-driven security in practice: An industrial experience}},
url = {http://www.springerlink.com/index/e55g612174j40828.pdf},
year = {2008}
}
@article{Villarroel2006,
author = {Villarroel, Rodolfo},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureDataWarehouse/Extending  A UML 2.0OCL extension for designing secure data warehouses.pdf:pdf},
journal = {Journal of Research \ldots},
keywords = {2,5,acm classification,confidentiality,d2,design tools and techniques,k6,ocl,secure data warehouse,security,security and protection,uml profile},
number = {1},
title = {{A UML 2.0/OCL extension for designing secure data warehouses}},
url = {http://alarcos.inf-cr.uclm.es/Alarnet/presentacion/Documentos/2006-JournalOfResearchAndPracticeInInformationTechnology-Villarroel.pdf},
volume = {38},
year = {2006}
}
@article{Mouheb2009,
address = {New York, New York, USA},
author = {Mouheb, Djedjiga and Talhi, Chamseddine and Lima, Vitor},
doi = {10.1145/1509297.1509300},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Weaving security aspects into UML 2.0 design models.pdf:pdf},
isbn = {9781605584515},
journal = {\ldots workshop on Aspect- \ldots},
pages = {7},
publisher = {ACM Press},
title = {{Weaving security aspects into UML 2.0 design models}},
url = {http://portal.acm.org/citation.cfm?doid=1509297.1509300 http://dl.acm.org/citation.cfm?id=1509300},
year = {2009}
}
@article{Alam2007,
author = {Alam, Masoom and Seifert, JP and Zhang, Xinwen},
doi = {10.1109/EDOC.2007.52},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Alam, Seifert, Zhang - 2007 - A model-driven framework for trusted computing based systems.pdf:pdf},
isbn = {0-7695-2891-0},
journal = {\ldots Distributed Object Computing \ldots},
month = oct,
pages = {75--75},
publisher = {Ieee},
title = {{A model-driven framework for trusted computing based systems}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4383983 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4383983},
year = {2007}
}
@article{Soler2009,
author = {Soler, Emilio and Trujillo, Juan},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/ManualSearch/Designing Secure Data Warehouses by Using MDA and QVT.pdf:pdf},
journal = {Journal of Universal \ldots},
number = {8},
pages = {1607--1641},
title = {{Designing secure Data warehouses by using MDA and QVT}},
url = {http://jucs.org/jucs\_15\_8/designing\_secure\_data\_warehouses/jucs\_15\_08\_1607\_1641\_soler.pdf},
volume = {15},
year = {2009}
}
@article{Breu2005,
author = {Breu, Ruth and Hafner, Michael and Weber, Barbara and Novak, Andrea},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Model driven security for inter-organizational workflows in e-government.pdf:pdf},
journal = {E-Government: Towards Electronic \ldots},
pages = {122--133},
title = {{Model driven security for inter-organizational workflows in e-government}},
url = {http://www.springerlink.com/index/2cvyyltjcguchg0m.pdf},
year = {2005}
}
@article{Basin2011,
author = {Basin, David and Clavel, Manuel and Egea, Marina},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureUML/Model-Driven Development of Security-Aware GUIs for Data-Centric Applications.pdf:pdf},
journal = {Foundations of security \ldots},
pages = {101--124},
title = {{Model-driven development of security-aware GUIs for data-centric applications}},
url = {http://www.springerlink.com/index/MH86914G75244102.pdf},
year = {2011}
}
@article{Jan2005a,
author = {J\"{u}rjens, J and Houmb, S},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/JanJurjen-UMLsec-Secure Systems Development with UML/Dynamic Secure Aspect Modeling with UML - From Models to Code.pdf:pdf},
journal = {Model Driven Engineering Languages and Systems},
pages = {142--155},
title = {{Dynamic secure aspect modeling with UML: From models to code}},
url = {http://www.springerlink.com/index/ln43804p643lhh01.pdf},
year = {2005}
}
@article{Fink2006,
author = {Fink, Torsten and Koch, Manuel and Pauls, Karl},
doi = {10.1016/j.entcs.2004.12.045},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/An MDA approach to Access Control Specifications Using MOF and UML Profiles.pdf:pdf},
issn = {15710661},
journal = {Electronic Notes in Theoretical Computer Science},
keywords = {corba,j2ee,mda,mdd,security,uml},
month = jan,
pages = {161--179},
title = {{An MDA approach to access control specifications using MOF and UML profiles}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S1571066105052175 http://www.sciencedirect.com/science/article/pii/S1571066105052175},
volume = {142},
year = {2006}
}
@article{Kolarczyk2006,
author = {Kolarczyk, Steffen and Koch, Manuel and L\"{o}hr, KP and Pauls, Karl},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecTOOL – Supporting Requirements Engineering for Access Control.pdf:pdf},
journal = {Emerging Trends in Information \ldots},
pages = {254--267},
title = {{SecTOOL–supporting requirements engineering for access control}},
url = {http://www.springerlink.com/index/T964831V501347X6.pdf},
year = {2006}
}
@article{Fernandez-medina2004,
author = {Fern\'{a}ndez-Medina, E and Piattini, Mario},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureDataWarehouse/Extending OCL for secure database development.pdf:pdf},
journal = {?> 2004-The Unified Modeling Language \ldots},
keywords = {confidentiality,multilevel databases,ocl,security constraints,uml},
pages = {380--394},
title = {{Extending OCL for secure database development}},
url = {http://www.springerlink.com/index/62k2xmr95f3uk7tg.pdf},
year = {2004}
}
@article{Jurjens2007,
author = {J\"{u}rjens, Jan and Shabalin, Pasha},
doi = {10.1007/s10009-007-0048-8},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/JanJurjen-UMLsec-Secure Systems Development with UML/Tools for secure systems development with UML.pdf:pdf},
issn = {1433-2779},
journal = {\ldots Journal on Software Tools for Technology Transfer \ldots},
keywords = {added-value by developing tool-support,for the analysis of,for-,formal verification,model-based development,requirements which can be,security,tool-support,uml,uml models against system},
month = jul,
number = {5-6},
pages = {527--544},
title = {{Tools for secure systems development with UML}},
url = {http://www.springerlink.com/index/10.1007/s10009-007-0048-8 http://www.springerlink.com/index/j5r1j40h568321u7.pdf},
volume = {9},
year = {2007}
}
@article{Hoisl2011,
author = {Hoisl, Bernhard and Sobernig, Stefan},
doi = {10.1109/ARES.2011.105},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Hoisl, Sobernig - 2011 - Integrity and confidentiality annotations for service interfaces in SoaML models.pdf:pdf},
isbn = {978-1-4577-0979-1},
journal = {Availability, Reliability and Security (ARES \ldots},
keywords = {-service-oriented architecture,ing,model-driven development,security engineer-,soaml,uml,web services},
month = aug,
pages = {673--679},
publisher = {Ieee},
title = {{Integrity and confidentiality annotations for service interfaces in SoaML models}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6046044 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=6046044},
year = {2011}
}
@article{Braga2011,
author = {Braga, Christiano},
doi = {10.1007/s10270-010-0156-x},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Braga - 2010 - A transformation contract to generate aspects from access control policies(2).pdf:pdf},
issn = {1619-1366},
journal = {Software and Systems Modeling},
month = mar,
number = {3},
pages = {395--409},
title = {{A transformation contract to generate aspects from access control policies}},
url = {http://www.springerlink.com/index/10.1007/s10270-010-0156-x http://www.springerlink.com/index/YH2G5QMTT6HWM0R8.pdf},
volume = {10},
year = {2011}
}
@article{Soler2007b,
author = {Soler, Emilio and Trujillo, Juan},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Soler, Trujillo - 2007 - Application of QVT for the Development of Secure Data Warehouses A case study.pdf:pdf},
isbn = {0769527752},
journal = {\ldots and Security, 2007. \ldots},
number = {1},
title = {{Application of QVT for the Development of Secure Data Warehouses: A case study}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4159881},
volume = {3},
year = {2007}
}
@article{Kim2006,
author = {Kim, DK and Gokhale, Priya},
doi = {10.1109/COMPSAC.2006.14},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Kim, Gokhale - 2006 - A pattern-based technique for developing UML models of access control systems.pdf:pdf},
isbn = {0-7695-2655-1},
journal = {Computer Software and Applications \ldots},
pages = {317--324},
publisher = {Ieee},
title = {{A pattern-based technique for developing UML models of access control systems}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4020092 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4020092},
year = {2006}
}
@article{Soler2007,
author = {Soler, Emilio and Trujillo, Juan},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/A Framework for the Development of Secure Data Warehouses based on MDA and QVT.pdf:pdf},
isbn = {0769527752},
journal = {\ldots and Security, 2007. \ldots},
number = {1},
pages = {1--5},
title = {{A Framework for the Development of Secure Data Warehouses based on MDA and QVT}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4159816},
volume = {3},
year = {2007}
}
@article{Agreiter2009,
author = {Agreiter, Berthold and Breu, R},
doi = {10.1007/978-3-642-05151-7\_10},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Agreiter, Breu - 2009 - Model-Driven Configuration of SELinux Policies.pdf:pdf},
isbn = {978-3-642-05150-0},
issn = {0302-9743},
journal = {On the Move to Meaningful Internet Systems: OTM \ldots},
pages = {887--904},
title = {{Model-Driven Configuration of SELinux Policies}},
url = {http://www.springerlink.com/index/7k72831367532288.pdf},
volume = {5871},
year = {2009}
}
@article{Hafner2006,
author = {Hafner, Michael and Alam, Muhammad and Breu, Ruth},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Towards a MOFQVT-based domain architecture for model driven security.pdf:pdf},
journal = {Model Driven Engineering Languages and \ldots},
pages = {275--290},
title = {{Towards a MOF/QVT-based domain architecture for model driven security}},
url = {http://www.springerlink.com/index/82236837212j2424.pdf},
year = {2006}
}
@article{Fernandez-medina2004a,
author = {Fern\'{a}ndez-Medina, E and Trujillo, Juan},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureDataWarehouse/Extending UML for designing secure data warehouses.pdf:pdf},
journal = {\ldots Modeling–ER 2004},
keywords = {multidimensional model-,secure data warehouses,uml extension},
pages = {217--230},
title = {{Extending UML for designing secure data warehouses}},
url = {http://www.springerlink.com/index/4kb9aa5vldkkbm2d.pdf},
year = {2004}
}
@article{Pavlich-Mariscal2010,
author = {Pavlich-Mariscal, JA and Demurjian, SA and Michel, LD},
doi = {10.1016/j.cose.2009.11.005},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/A framework of composable access control features.pdf:pdf},
issn = {01674048},
journal = {Computers \& Security},
month = may,
number = {3},
pages = {350--379},
publisher = {Elsevier Ltd},
title = {{A framework of composable access control features: Preserving separation of access control concerns from models to code}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0167404809001382 http://www.sciencedirect.com/science/article/pii/S0167404809001382},
volume = {29},
year = {2010}
}
@article{Breu2008,
author = {Breu, R and Hafner, M},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Model-driven security engineering of service oriented systems.pdf:pdf},
journal = {\ldots Systems and e-Business \ldots},
title = {{Model-driven security engineering of service oriented systems}},
url = {http://www.springerlink.com/index/kg10t33720m07732.pdf},
year = {2008}
}
@article{Mouratidis2006,
author = {Mouratidis, Haralambos and J\"{u}rjens, Jan and Fox, Jorge},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/UMLsec/Towards a comprehensive framework for secure systems development.pdf:pdf},
journal = {Advanced information systems engineering},
pages = {48--62},
title = {{Towards a comprehensive framework for secure systems development}},
url = {http://www.springerlink.com/index/d707jr6kg554203q.pdf},
year = {2006}
}
@article{Jurjens2006,
author = {J\"{u}rjens, J},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/JanJurjen-UMLsec-Secure Systems Development with UML/Model-Based Security Engineering for Real.pdf:pdf},
journal = {FM 2006: Formal Methods},
pages = {600--606},
title = {{Model-based security engineering for real}},
url = {http://www.springerlink.com/index/W35621542Q772540.pdf},
year = {2006}
}
@article{Moebius2009b,
author = {Moebius, Nina and Stenzel, Kurt and Reif, Wolfgang},
doi = {10.1109/IWSESS.2009.5068461},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Moebius, Stenzel, Reif - 2009 - Generating formal specifications for security-critical applications - A model-driven approach.pdf:pdf},
isbn = {978-1-4244-3725-2},
journal = {Software Engineering for \ldots},
keywords = {[Electronic Manuscript]},
month = may,
pages = {68--74},
publisher = {Ieee},
title = {{Generating formal specifications for security-critical applications-A model-driven approach}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5068461 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5068461},
year = {2009}
}
@article{Alam2004,
author = {Alam, MM and Breu, R and Breu, Michael},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Alam, Breu, Breu - 2004 - Model driven security for Web services (MDS4WS).pdf:pdf},
isbn = {0780386809},
journal = {Multitopic Conference, 2004. \ldots},
title = {{Model driven security for Web services (MDS4WS)}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1492930},
year = {2004}
}
@article{Blanco2009,
author = {Blanco, Carlos},
doi = {10.1109/ARES.2009.68},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Blanco - 2009 - Applying an MDA-based approach to consider security rules in the development of Secure DWs.pdf:pdf},
isbn = {978-1-4244-3572-2},
journal = {\ldots and Security, 2009. \ldots},
pages = {528--533},
publisher = {Ieee},
title = {{Applying an MDA-based approach to consider security rules in the development of Secure DWs}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5066521 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5066521},
year = {2009}
}
@article{Menzel2010a,
author = {Menzel, Michael},
doi = {10.1109/ICWS.2010.25},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Menzel - 2010 - A Pattern-driven Generation of Security Policies for Service-oriented Architectures.pdf:pdf},
isbn = {978-1-4244-8146-0},
journal = {Web Services (ICWS), \ldots},
month = jul,
pages = {243--250},
publisher = {Ieee},
title = {{A Pattern-driven Generation of Security Policies for Service-oriented Architectures}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5552780 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5552780},
year = {2010}
}
@article{Sanchez2010,
author = {S\'{a}nchez, Pablo and Moreira, Ana and Fuentes, Lidia},
doi = {10.1016/j.infsof.2009.09.001},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Model-driven development for early aspects.pdf:pdf},
issn = {09505849},
journal = {Information and Software \ldots},
month = mar,
number = {3},
pages = {249--273},
publisher = {Elsevier B.V.},
title = {{Model-driven development for early aspects}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0950584909001669 http://www.sciencedirect.com/science/article/pii/S0950584909001669},
volume = {52},
year = {2010}
}
@article{Jan2008,
author = {J\"{u}rjens, J},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/UMLsec/Model-Based Run-Time Checking of Security Permissions Using Guarded Objects.pdf:pdf},
journal = {Runtime Verification},
pages = {36--50},
title = {{Model-based run-time checking of security permissions using guarded objects}},
url = {http://www.springerlink.com/index/79826q04p15x52r4.pdf},
year = {2008}
}
@article{Jan2006,
author = {J\"{u}rjens, J},
doi = {10.1016/j.entcs.2005.07.012},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/J\"{u}rjens - 2006 - Foundations for Designing Secure Architectures.pdf:pdf},
journal = {Electronic Notes in Theoretical Computer Science},
keywords = {cryptographic,formal methods in security,secure architectures,secure software engineering,security,security engineering,security evaluation,security models,verification},
pages = {31--46},
title = {{Foundations for Designing Secure Architectures}},
url = {http://www.sciencedirect.com/science/article/pii/S1571066105052096},
volume = {142},
year = {2006}
}
@article{Blanco,
author = {Blanco, Carlos and P\'{e}rez-Castillo, R},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureDataWarehouse/Towards a Modernization Process for Secure Data Warehouses.pdf:pdf},
journal = {Data Warehousing and \ldots},
number = {Mda 2003},
pages = {24--35},
title = {{Towards a modernization process for Secure Data Warehouses}},
url = {http://www.springerlink.com/index/3153134147572147.pdf},
year = {2009}
}
@article{Moebius2012,
address = {New York, New York, USA},
author = {Moebius, Nina and Stenzel, Kurt and Borek, Marian and Reif, Wolfgang},
doi = {10.1145/2422498.2422507},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Moebius et al. - 2012 - Incremental Development of large, secure Smart Card Applications.pdf:pdf},
isbn = {9781450318068},
journal = {mdsec2012.pst.ifi.lmu.de},
pages = {1--6},
publisher = {ACM Press},
title = {{Incremental Development of large, secure Smart Card Applications}},
url = {http://dl.acm.org/citation.cfm?doid=2422498.2422507 http://mdsec2012.pst.ifi.lmu.de/accepted\_papers/mdsec2012\_submission\_9.pdf},
year = {2012}
}
@article{Hafner2008,
author = {Hafner, Michael and Memon, Mukhtiar and Alam, Muhammad},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SECTET/Modeling and enforcing advanced access control policies in healthcare systems with SECTET.pdf:pdf},
journal = {Models in Software Engineering},
pages = {132--144},
title = {{Modeling and enforcing advanced access control policies in healthcare systems with sectet}},
url = {http://www.springerlink.com/index/7710047Q42U52420.pdf},
year = {2008}
}
@article{Alam2006b,
author = {Alam, Muhammad and Hafner, Michael and Breu, Ruth},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Alam, Hafner, Breu - 2006 - A constraint based role based access control in the SECTET a model-driven approach.pdf:pdf},
isbn = {1595936041},
journal = {\ldots of the 2006 International Conference on \ldots},
keywords = {model-driven architecture,model-driven security,role based access con-,service oriented architectures,trol},
number = {c},
pages = {1--13},
title = {{A constraint based role based access control in the SECTET a model-driven approach}},
url = {http://dl.acm.org/citation.cfm?id=1501451},
year = {2006}
}
@article{Lodderstedt2002,
author = {Lodderstedt, Torsten and Basin, David and Doser, J.},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Lodderstedt, Basin, Doser - 2002 - SecureUML A UML-based modeling language for model-driven security.pdf:pdf},
journal = {\ldots 2002—The Unified Modeling Language},
pages = {426--441},
publisher = {Springer},
title = {{SecureUML: A UML-based modeling language for model-driven security}},
url = {http://www.springerlink.com/index/a82dhdta602g43r5.pdf},
year = {2002}
}
@article{McDougall2004,
address = {New York, New York, USA},
author = {McDougall, Michael and Alur, Rajeev and Gunter, CA},
doi = {10.1145/1017753.1017789},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/A model-based approach to integrating security policies for embedded devices.pdf:pdf},
isbn = {1581138601},
journal = {Proceedings of the fourth ACM international conference on Embedded software - EMSOFT '04},
keywords = {java cards,model based design,policy integration,smartcards},
pages = {211},
publisher = {ACM Press},
title = {{A model-based approach to integrating security policies for embedded devices}},
url = {http://portal.acm.org/citation.cfm?doid=1017753.1017789 http://repository.upenn.edu/cis\_papers/185/},
year = {2004}
}
@article{Morin2010,
author = {Morin, Brice and Mouelhi, T and Fleurey, F},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Security-driven model-based dynamic adaptation.pdf:pdf},
isbn = {9781450301169},
journal = {Proceedings of the \ldots},
keywords = {access-control,adaptive system,model-driven engineer-},
pages = {205--214},
title = {{Security-driven model-based dynamic adaptation}},
url = {http://dl.acm.org/citation.cfm?id=1858996.1859040},
year = {2010}
}
@article{Menzel2009,
author = {Menzel, Michael and Meinel, Christoph},
doi = {10.1109/SCC.2009.57},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Menzel, Meinel - 2009 - A security meta-model for service-oriented architectures.pdf:pdf},
isbn = {978-1-4244-5183-8},
journal = {Services Computing, 2009. SCC'09. IEEE \ldots},
pages = {251--259},
publisher = {Ieee},
title = {{A security meta-model for service-oriented architectures}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5283952 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5283952},
year = {2009}
}
@article{Best2007,
author = {Jurjens, J and Best, Bastian and Nuseibeh, Bashar},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/UMLsec/Model-based security engineering of distributed information systems using UMLsec.pdf:pdf},
isbn = {0769528287},
journal = {\ldots Engineering, 2007. ICSE 2007. \ldots},
title = {{Model-based security engineering of distributed information systems using UMLsec}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4222619},
year = {2007}
}
@article{Nakamura2005,
author = {Nakamura, Yuichi and Tatsubori, Michiaki},
file = {:C$\backslash$:/Users/phuhong.nguyen/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Nakamura, Tatsubori - 2005 - Model-driven security based on a web services security architecture.pdf:pdf},
isbn = {0769524087},
journal = {Services Computing, \ldots},
title = {{Model-driven security based on a web services security architecture}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1531233},
year = {2005}
}
@article{Satoh2006,
author = {Satoh, Fumiko and Nakamura, Yuichi and Ono, Koichi},
doi = {10.1109/ICWS.2006.25},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/Adding Authentication to Model Driven Security.pdf:pdf},
isbn = {0-7695-2669-1},
journal = {Web Services, 2006. ICWS'06. \ldots},
pages = {585--594},
publisher = {Ieee},
title = {{Adding Authentication to model driven security}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4032072 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4032072},
year = {2006}
}
@article{Moebius2009a,
author = {Moebius, Nina and Stenzel, Kurt},
doi = {10.1109/ARES.2009.22},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/SecureMDD/SecureMDD A Model-Driven Development Method for Secure Smart Card Applications.pdf:pdf},
isbn = {978-1-4244-3572-2},
journal = {\ldots , Reliability and Security, \ldots},
pages = {841--846},
publisher = {Ieee},
title = {{SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5066574 http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5066574},
year = {2009}
}
@article{Carlos2010,
author = {Vela, B and Blanco, Carlos},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Model driven development of secure XML data warehouses a case study.pdf:pdf},
isbn = {9781605589909},
journal = {Proceedings of the 2010 \ldots},
title = {{Model driven development of secure XML data warehouses: a case study}},
url = {http://dl.acm.org/citation.cfm?id=1754251},
year = {2010}
}
@article{Hoisl2012,
author = {Hoisl, Bernhard and Sobernig, Stefan and Strembeck, Mark},
doi = {10.1007/s10270-012-0263-y},
file = {:D$\backslash$:/1.PhD-MITER/1.MyPapers/\_SVN/articles/2013/MODELS2013\_aSLRofMDSecurity/Protocol4aSLRofMDSecurity/CandidatePapers/IncludedPapers/Modeling and enforcing secure object flows in process-driven SOAs an integrated model-driven approach.pdf:pdf},
issn = {1619-1366},
journal = {Software \& Systems Modeling},
keywords = {model-driven development,process modeling,secure object flows,security engineering,service-oriented architecture,soaml,uml,web services},
month = oct,
title = {{Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach}},
url = {http://www.springerlink.com/index/10.1007/s10270-012-0263-y http://link.springer.com/article/10.1007/s10270-012-0263-y},
year = {2012}
}
@article{Jan2005,
author = {J\"{u}rjens, J},
file = {:D$\backslash$:/1.PhD-MITER/2.RelatedWorks/1.Model-DrivenSecurity/JanJurjen-UMLsec-Secure Systems Development with UML/Model-based Security Engineering with UML.pdf:pdf},
journal = {Foundations of Security Analysis and Design III},
pages = {42--77},
title = {{Model-based security engineering with UML}},
url = {http://www.springerlink.com/index/27arnvf0we39ml9k.pdf},
year = {2005}
}
