Towards Development of Secure Systems Using UMLsec
- 23 March 2001
- book chapter
- Published by Springer Nature
- p. 187-200
- https://doi.org/10.1007/3-540-45314-8_14
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Defining UML family members using prefacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Secure Information Flow for Concurrent ProcessesPublished by Springer Nature ,2000
- Software engineering for securityPublished by Association for Computing Machinery (ACM) ,2000
- Using Relational and Behavioural Semantics in the Verification of Object ModelsPublished by Springer Nature ,2000
- Systems, Views and Models of UMLPublished by Springer Nature ,1998
- A Java-based distributed platform for multilateral securityPublished by Springer Nature ,1998
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- Why cryptosystems failCommunications of the ACM, 1994
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982