% This file was created with JabRef 2.8.1.
% Encoding: Cp1252

@ARTICLE{mdse-breu-jos-2007,
  author = {{A}lam, {M}asoom and {B}reu, {R}uth and {H}afner, {M}ichael},
  title = {{M}odel-{D}riven {S}ecurity {E}ngineering for {T}rust {M}anagement
	in {SECTET}},
  journal = {{J}ournal of {S}oftware},
  year = {2007},
  volume = {2},
  pages = {47--59},
  number = {1},
  month = {February},
  date-added = {2013-01-01 21:15:14 +0000},
  date-modified = {2013-01-01 21:18:35 +0000},
  keywords = {model driven security; trust management}
}

@ARTICLE{Basin:2009:AAS:1512996.1513226,
  author = {{B}asin, {D}avid and {C}lavel, {M}anuel and {D}oser, {J}\"{u}rgen
	and {E}gea, {M}arina},
  title = {{A}utomated {A}nalysis of {S}ecurity-{D}esign {M}odels},
  journal = {{I}nformation and {S}oftware {T}echnology},
  year = {2009},
  volume = {51},
  pages = {815--831},
  number = {5},
  month = {May},
  date-added = {2013-01-18 15:31:52 +0000},
  date-modified = {2013-01-18 15:35:17 +0000},
  keywords = {formal analysis, metamodels, OCL, secureUML}
}

@INPROCEEDINGS{Basin:2011:DMS:1998441.1998443,
  author = {{B}asin, {D}avid and {C}lavel, {M}anuel and {E}gea, {M}arina},
  title = {{A} {D}ecade of {M}odel-{D}riven {S}ecurity},
  booktitle = {{P}roceedings of the 16th {ACM} {S}ymposium on {A}ccess {C}ontrol
	{M}odels and {T}echnologies},
  year = {2011},
  series = {SACMAT'11},
  pages = {1--10},
  address = {Innsbruck, Austria},
  month = {June},
  date-added = {2012-11-30 01:42:20 +0000},
  date-modified = {2012-12-04 13:56:14 +0000},
  keywords = {code generation, model analysis, model transformation, model-driven
	development, model-driven security}
}

@ARTICLE{Basin:2006:MDS:1125808.1125810,
  author = {{B}asin, {D}avid and {D}oser, {J}\"{u}rgen and {L}odderstedt, {T}orsten},
  title = {{M}odel {D}riven {S}ecurity: from {UML} {M}odels to {A}ccess {C}ontrol
	{I}nfrastructures},
  journal = {{ACM} {T}ransactions on {S}oftware {E}ngineering and {M}ethodology
	({TOSEM})},
  year = {2006},
  volume = {15},
  pages = {39--91},
  number = {1},
  month = {January},
  date-added = {2012-12-05 17:17:49 +0000},
  date-modified = {2012-12-05 17:20:29 +0000},
  keywords = {mds}
}

%Problem here in the author list
@INPROCEEDINGS{Basin:2003:MDS:775412.775425,
  author = {Basin, David and Doser, J\"urgen and Lodderstedt, Torsten},
  title = {{M}odel {D}riven {S}ecurity for {P}rocess-{O}riented {S}ystems},
  booktitle = {{P}roceedings of the {E}ighth {ACM} {S}ymposium on {A}ccess {C}ontrol
	{M}odels and {T}echnologies},
  year = {2003},
  series = {SACMAT'03},
  pages = {100--109},
  address = {Como, Italy},
  month = {June},
  date-added = {2012-12-05 17:12:50 +0000},
  date-modified = {2012-12-05 17:17:47 +0000}
}

@INCOLLECTION{10.1007/978-3-642-24474-2-1,
  author = {{B}asin, {D}avid and {S}challer, {P}atrick and {S}chl\"apfer, {M}ichael},
  title = {{S}ecurity {P}rinciples},
  booktitle = {{A}pplied {I}nformation {S}ecurity: {A} {H}ands-on {A}pproach},
  year = {2011},
  pages = {1--16},
  date-added = {2012-12-03 18:12:39 +0000},
  date-modified = {2012-12-03 18:18:59 +0000}
}

@INCOLLECTION{10.1007/978-3-540-78942-0-8,
  author = {{B}reu, {R}uth and {H}afner, {M}ichael and {I}nnerhofer-{O}berperfler,
	{F}rank and {W}ozak, {F}lorian},
  title = {{M}odel-{D}riven {S}ecurity {E}ngineering of {S}ervice {O}riented
	{S}ystems},
  booktitle = {{I}nformation {S}ystems and e-{B}usiness {T}echnologies},
  year = {2008},
  volume = {5},
  series = {Lecture Notes in Business Information Processing},
  pages = {59--71},
  date-added = {2013-01-01 21:02:55 +0000},
  date-modified = {2013-01-01 21:07:03 +0000},
  keywords = {security engineering; security analysis; service oriented architecture}
}

@ARTICLE{10.1007/s10009-007-0045-y,
  author = {{B}reu, {R}uth and {P}opp, {G}erhard and {A}lam, {M}uhammad},
  title = {{M}odel {B}ased {D}evelopment of {A}ccess {P}olicies},
  journal = {{I}nternational {J}ournal on {S}oftware {T}ools for {T}echnology
	{T}ransfer},
  year = {2007},
  volume = {9},
  pages = {457--470},
  number = {5-6},
  month = {October},
  date-added = {2013-01-01 21:50:05 +0000},
  date-modified = {2013-01-01 21:53:40 +0000},
  keywords = {Model based development; SECTET; access policies}
}

@ARTICLE{Capretz:2005,
  author = {{C}apretz, {L}uiz {F}.},
  title = {{Y}: {A} {N}ew {C}omponent-{B}ased {S}oftware {L}ife {C}ycle {M}odel},
  journal = {Journal of Computer Science},
  year = {2005},
  volume = {1},
  pages = {76--82},
  number = {1},
  month = {March}
}

@INCOLLECTION{10.1007/978-3-540-69100-6-22,
  author = {{C}lavel, {M}anuel and {D}a {S}ilva, {V}iviane and {B}raga, {C}hristiano
	and {E}gea, {M}arina},
  title = {{M}odel-{D}riven {S}ecurity in {P}ractice: {A}n {I}ndustrial {E}xperience},
  booktitle = {{M}odel {D}riven {A}rchitecture - {F}oundations and {A}pplications},
  year = {2008},
  volume = {5095},
  series = {Lecture Notes in Computer Science},
  pages = {326--337},
  month = {June},
  date-added = {2012-12-14 05:56:52 +0000},
  date-modified = {2012-12-14 06:03:30 +0000}
}

@INCOLLECTION{10.1007/3-540-45923-5-12,
  author = {{D}e {L}ara, {J}uan and {V}angheluwe, {H}ans},
  title = {{AToM3}: {A} {T}ool for {M}ulti-formalism and {M}eta-{M}odeling},
  booktitle = {{F}undamental {A}pproaches to {S}oftware {E}ngineering},
  year = {2002},
  volume = {2306},
  series = {Lecture Notes in Computer Science},
  pages = {174--188},
  date-added = {2012-12-06 01:46:30 +0000},
  date-modified = {2012-12-06 01:52:21 +0000},
  keywords = {meta-modeling, multi-formalism}
}

@INPROCEEDINGS{Fisler:2005:VCA:1062455.1062502,
  author = {{F}isler, {K}athi and {K}rishnamurthi, {S}hriram and {M}eyerovich,
	{L}eo {A}. and {T}schantz, {M}ichael {C}arl},
  title = {{V}erification and {C}hange-{I}mpact {A}nalysis of {A}ccess-{C}ontrol
	{P}olicies},
  booktitle = {{P}roceedings of the 27th {I}nternational {C}onference on {S}oftware
	{E}ngineering},
  year = {2005},
  series = {ICSE'05},
  pages = {196--205},
  address = {St. Louis, MO, USA},  
  date-added = {2012-12-06 01:21:34 +0000},
  date-modified = {2012-12-06 01:30:56 +0000},
  keywords = {XACML, access-control policies, change-impact analysis, decision diagram}
}

@TECHREPORT{TR:OMG-MOF-Specification-2006,
  author = {{O}bject {M}anagement {G}roup},
  title = {{M}eta-{O}bject {F}acility 2.0 {C}ore {S}pecification (06-01-01)},
  institution = {\textsc{Omg}},
  year = {2006},
  organization = {Object Management Group},
  owner = {Moussa Amrani},
  timestamp = {2010.10.20}
}

@MANUAL{omg/2003-06-01,
  title = {{MDA} {G}uide {V}ersion 1.0.1},
  author = {{O}bject {M}anagement {G}roup},
  month = {June},
  year = {2003},
  date-added = {2012-11-30 01:31:58 +0000},
  date-modified = {2012-11-30 01:36:42 +0000},
  keywords = {Model driven architecture}
}

@OTHER{mds:henn,
  author = {{H}enn, {C}hris},
  bdsk-url-1 = {http://www.youtube.com/watch?v=6-vKbRrr3mo},
  date-added = {2012-12-14 06:06:10 +0000},
  date-modified = {2012-12-14 06:14:00 +0000},
  lastchecked = {2012},
  month = {March},
  title = {``{M}odel {D}riven {S}ecurity'' speech at {ISSS} {S}ecurity {D}inner,
	{Z}urich {S}witzerland},
  url = {http://www.youtube.com/watch?v=6-vKbRrr3mo},
  year = {2010}
}

@BOOK{ms:sec-dev-lifecycle,
  title = {{T}he {S}ecurity {D}evelopment {L}ifecycle},
  publisher = {Microsoft Press},
  year = {2006},
  author = {{H}oward, {M}ichael and {L}ipner, {S}teve},
  month = {May},
  date-added = {2012-11-30 02:18:36 +0000},
  date-modified = {2012-11-30 02:21:23 +0000},
  keywords = {Security}
}

@ARTICLE{5560678,
  author = {{H}uang, {H}ejiao and {K}irchner, {H}\'el\`ene},
  title = {{F}ormal {S}pecification and {V}erification on {M}odular {S}ecurity
	{P}olicy {B}ased on {C}olored {P}etri {N}ets},
  journal = {{D}ependable and {S}ecure {C}omputing, {IEEE} {T}ransactions on},
  year = {2011},
  volume = {8},
  pages = {852--865},
  number = {6},
  month = {November},
  date-added = {2012-12-06 01:19:20 +0000},
  date-modified = {2012-12-06 01:21:27 +0000}
}

%Problem here in author list
@INCOLLECTION{springerlink:10.1007/11804192-4,
  author = {J\"urjens, Jan},
  title = {{M}odel-{B}ased {S}ecurity {E}ngineering with {UML}: {I}ntroducing
	{S}ecurity {A}spects},
  booktitle = {{F}ormal {M}ethods for {C}omponents and {O}bjects},
  year = {2006},
  volume = {4111},
  pages = {64--87},
  date-added = {2012-12-05 17:06:59 +0000},
  date-modified = {2012-12-05 17:10:35 +0000}
}

@INCOLLECTION{springerlink:10.1007/3-540-45314-8-14,
  author = {{J}{\"u}rjens, {J}an},
  title = {{T}owards {D}evelopment of {S}ecure {S}ystems {U}sing {UMLsec}},
  booktitle = {{F}undamental {A}pproaches to {S}oftware {E}ngineering},
  year = {2001},
  volume = {2029},
  pages = {187--200},
  date-added = {2012-12-05 17:03:05 +0000},
  date-modified = {2012-12-05 17:06:37 +0000}
}

@INPROCEEDINGS{10.1109/ARES.2011.110,
  author = {{J}ensen, {J}ostein and {J}aatun, {M}artin {G}ilje},
  title = {{S}ecurity in {M}odel {D}riven {D}evelopment: {A} {S}urvey},
  booktitle = {{A}vailability, {R}eliability and {S}ecurity ({ARES}), 2011 {S}ixth
	{I}nternational {C}onference on},
  year = {2011},
  pages = {704--709},
  address = {Vienna, Austria},
  month = {August},
  date-added = {2012-11-26 14:56:53 +0000},
  date-modified = {2012-11-26 15:03:17 +0000},
  keywords = {model driven development security;software development;security of
	data;software engineering;}
}

@BOOK{B:Kelly-Tolvanen:2008,
  title = {{D}omain-{S}pecific {M}odeling: {E}nabling {F}ull {C}ode {G}eneration},
  publisher = {Wiley-IEEE Computer Society},
  year = {2008},
  author = {{K}elly, {S}teven and {T}olvanen, {J}uha-{P}ekka},
  month = {March}
}

@INCOLLECTION{springerlink:10.1007/978-3-642-16086-8-8,
  author = {{K}ienzle, {J}\"org and {A}l {A}bed, {W}isam and {F}leurey, {F}ranck
	and {J}\'ez\'equel, {J}ean-{M}arc and {K}lein, {J}acques},
  title = {{A}spect-{O}riented {D}esign with {R}eusable {A}spect {M}odels},
  booktitle = {{T}ransactions on {A}spect-{O}riented {S}oftware {D}evelopment {VII}},
  year = {2010},
  volume = {6210},
  series = {Lecture Notes in Computer Science},
  pages = {272--320},
  date-added = {2012-12-06 01:35:22 +0000},
  date-modified = {2012-12-06 01:39:23 +0000}
}

@INCOLLECTION{10.1007/978-3-540-74987-5-6,
  author = {{K}im, {A}nya and {L}uo, {J}im and {K}ang, {M}yong},
  title = {{S}ecurity {O}ntology to {F}acilitate {W}eb {S}ervice {D}escription
	and {D}iscovery},
  booktitle = {{J}ournal on {D}ata {S}emantics {IX}},
  year = {2007},
  volume = {4601},
  pages = {167--195},
  date-added = {2012-12-03 17:42:40 +0000},
  date-modified = {2012-12-03 17:57:08 +0000}
}

@TECHREPORT{TR/SE-0401,
  author = {{K}itchenham, {B}arbara},
  title = {{P}rocedures for {P}erforming {S}ystematic {R}eviews},
  institution = {Keele University},
  year = {2004},
  type = {Technical Report},
  number = {TR/SE-0401},
  date-added = {2012-11-26 17:05:55 +0000},
  date-modified = {2012-11-26 17:08:18 +0000}
}

@BOOK{B:Kleppe:2009,
  title = {{S}oftware {L}anguage {E}ngineering: {C}reating {D}omain-{S}pecific
	{L}anguages {U}sing {M}etamodels},
  publisher = {Addison-Wesley},
  year = {2009},
  author = {{K}leppe, {A}nneke},
  address = {Upper Saddle River, NJ},
  owner = {Moussa Amrani},
  timestamp = {2010.10.15}
}

@INPROCEEDINGS{citeulike:10644974,
  author = {{L}ang, {U}lrich and {S}chreiner, {R}udolf},
  title = {{M}odel {D}riven {S}ecurity {M}anagement: {M}aking {S}ecurity {M}anagement
	{M}anageable in {C}omplex {D}istributed {S}ystems},
  booktitle = {{M}odeling {S}ecurity {W}orkshop in association with {MODELS}},
  year = {2008},
  volume = {8},
  address = {Toulouse, France},
  month = {September},
  date-added = {2012-11-30 03:43:54 +0000},
  date-modified = {2012-11-30 03:48:08 +0000},
  keywords = {mda, model-driven-security, security-model}
}

@INPROCEEDINGS{Lee:2011:HAM:2038642.2038646,
  author = {{L}ee, {E}dward {A}.},
  title = {{H}eterogeneous {A}ctor {M}odeling},
  booktitle = {{P}roceedings of the {N}inth {ACM} {I}nternational {C}onference on
	{E}mbedded {S}oftware},
  year = {2011},
  series = {EMSOFT'11},
  pages = {3--12},
  address = {Taipei, Taiwan},
  month = {October},
  date-added = {2012-12-06 01:55:14 +0000},
  date-modified = {2012-12-06 01:59:05 +0000},
  keywords = {heterogeneity, ptolemy}
}

@ARTICLE{Li:2008:BSD:1379759.1379760,
  author = {{L}i, {N}inghui and {W}ang, {Q}ihua},
  title = {{B}eyond {S}eparation of {D}uty: {A}n {A}lgebra for {S}pecifying
	{H}igh-{L}evel {S}ecurity {P}olicies},
  journal = {{J}ournal of {ACM}},
  year = {2008},
  volume = {55},
  pages = {12:1--12:46},
  number = {3},
  month = {July},
  date-added = {2012-12-04 13:30:40 +0000},
  date-modified = {2012-12-04 13:37:00 +0000}
}

@ARTICLE{JCISIMA:MA:MDS,
  author = {{M}a, {Z}hendong and {W}agner, {C}hristian and {W}oitsch, {R}obert
	and {S}kopik, {F}lorian and {B}leier, {T}homas},
  title = {{M}odel-{D}riven {S}ecurity: from {T}heory to {A}pplication},
  journal = {{I}nternational {J}ournal of {C}omputer {I}nformation {S}ystems and
	{I}ndustrial {M}anagement {A}pplications},
  year = {2013},
  volume = {5},
  pages = {151--158},
  date-added = {2012-12-14 05:49:41 +0000},
  date-modified = {2012-12-14 05:53:30 +0000},
  keywords = {model driven security, e-government, web service}
}

@TECHREPORT{gartner:mds,
  author = {{M}ac{D}onald, {N}eil},
  title = {{M}odel-{D}riven {S}ecurity: {E}nabling a {R}eal-{T}ime, {A}daptive
	{S}ecurity {I}nfrastructure},
  institution = {Gartner, Inc.},
  year = {2007},
  month = {September},
  bdsk-url-1 = {http://www.gartner.com/id=525109},
  date-added = {2012-11-30 03:39:31 +0000},
  date-modified = {2012-11-30 03:41:20 +0000},
  url = {http://www.gartner.com/id=525109}
}

@INPROCEEDINGS{10.1109/ASWEC.2009.15,
  author = {{M}oebius, {N}ina and {S}tenzel, {K}urt and {G}randy, {H}olger and
	{R}eif, {W}olfgang},
  title = {{M}odel-{D}riven {C}ode {G}eneration for {S}ecure {S}mart {C}ard
	{A}pplications},
  booktitle = {{S}oftware {E}ngineering {C}onference 2009, {ASWEC}'09 {A}ustralian},
  year = {2009},
  pages = {44--53},
  address = {Australia},
  month = {April},
  date-added = {2012-11-26 16:37:41 +0000},
  date-modified = {2012-11-26 16:46:17 +0000},
  keywords = {Java card code;formal specification;model-driven code generation;platform-independent
	UML model;smart card;Java;Unified Modeling Language;formal specification;security
	of data;smart cards;}
}

@INCOLLECTION{10.1007/978-3-8348-9283-6-8,
  author = {Mu\~noz, Jos\'e de la Pe\~na},
  title = {{I}nformation {S}ecurity {I}ndustry: {S}tate of the {A}rt},
  booktitle = {{ISSE} 2008 {S}ecurity {E}lectronic {B}usiness {P}rocesses},
  year = {2009},
  pages = {84--89},
  date-added = {2012-12-13 16:12:41 +0000},
  date-modified = {2012-12-13 16:27:01 +0000}
}

@ARTICLE{sanchez:jucs-15-15,
  author = {{S}\'anchez, \'{O}scar and {M}olina, {F}ernando and {G}arc\'ia-{M}olina,
	{J}es\'us and {T}oval, {A}mbrosio},
  title = {{M}odel{S}ec: {A} {G}enerative {A}rchitecture for {M}odel-{D}riven
	{S}ecurity},
  journal = {{J}ournal of {U}niversal {C}omputer {S}cience},
  year = {2009},
  volume = {15},
  pages = {2957--2980},
  number = {15},
  month = {September},
  date-added = {2012-12-14 01:28:07 +0000},
  date-modified = {2012-12-14 01:31:38 +0000},
  keywords = {model driven security}
}

@ARTICLE{10.1109/WORDS.2005.11,
  author = {{S}hafiq, {B}asit and {M}asood, {A}mmar and {J}oshi, {J}ames and
	{G}hafoor, {A}rif},
  title = {{A} {R}ole-{B}ased {A}ccess {C}ontrol {P}olicy {V}erification {F}ramework
	for {R}eal-{T}ime {S}ystems},
  journal = {{O}bject-{O}riented {R}eal-{T}ime {D}ependable {S}ystems, {IEEE}
	{I}nternational {W}orkshop on},
  year = {2005},
  pages = {13--20},
  address = {Los Alamitos, CA, USA},
  date-added = {2012-12-14 01:49:35 +0000},
  date-modified = {2012-12-14 01:53:33 +0000},
}

@INCOLLECTION{10.1201/9781420068429-c14,
  author = {{S}hin, {M}ichael and {G}omaa, {H}assan},
  title = {{S}eparating {A}pplication and {S}ecurity {C}oncerns in {M}odeling
	{S}oftware {P}roduct {L}ines},
  booktitle = {{A}pplied {S}oftware {P}roduct {L}ine {E}ngineering},
  year = {2009},
  editor = {Kang, Kyo C. and Sugumaran, Vijayan and Park, Sooyong},
  chapter = {14},
  pages = {337--366},
  edition = {1st},
  date-added = {2012-12-10 18:26:40 +0000},
  date-modified = {2012-12-10 18:38:58 +0000},
  keywords = {separation of security concern}
}

@ARTICLE{sinan2003,
  author = {{S}i {A}lhir, {S}inan},
  title = {{U}nderstanding the {M}odel {D}riven {A}rchitecture ({MDA})},
  journal = {{M}ethods and {T}ools},
  year = {2003},
  volume = {11},
  pages = {17--24},
  number = {3},
  date-added = {2012-11-29 16:49:24 +0000},
  date-modified = {2012-12-04 16:00:13 +0000},
  keywords = {Model driven architecture}
}

@ARTICLE{vanWyk:2005:BGS:1092708.1092755,
  author = {{V}an {W}yk, {K}enneth {R}. and {M}c{G}raw, {G}ary},
  title = {{B}ridging the {G}ap between {S}oftware {D}evelopment and {I}nformation
	{S}ecurity},
  journal = {{IEEE} {S}ecurity and {P}rivacy},
  year = {2005},
  volume = {3},
  pages = {75--79},
  number = {5},
  month = {September},
  date-added = {2012-11-30 01:58:33 +0000},
  date-modified = {2012-11-30 02:00:15 +0000}
}

@INPROCEEDINGS{Xu:2012:MAA:2295136.2295173,
  author = {{X}u, {D}ianxiang and {T}homas, {L}ijo and {K}ent, {M}ichael and
	{M}ouelhi, {T}ejeddine and {L}e {T}raon, {Y}ves},
  title = {{A} {M}odel-based {A}pproach to {A}utomated {T}esting of {A}ccess
	{C}ontrol {P}olicies},
  booktitle = {{P}roceedings of the 17th {ACM} symposium on {A}ccess {C}ontrol {M}odels
	and {T}echnologies},
  year = {2012},
  series = {SACMAT'12},
  pages = {209--218},
  address = {New York, USA},
  month = {June},
  date-added = {2012-12-11 18:13:30 +0000},
  date-modified = {2012-12-11 18:18:00 +0000},
  keywords = {access control, model-based testing, mutation analysis, petri nets,
	software testing}
}

@article{Kalfoglou:2003:OMS:975027.975028,
 author = {Kalfoglou, Yannis and Schorlemmer, Marco},
 title = {Ontology mapping: the state of the art},
 journal = {Knowl. Eng. Rev.},
 issue_date = {January 2003},
 volume = {18},
 number = {1},
 month = jan,
 year = {2003},
 pages = {1--31}
} 
