Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,442,791 papers from all fields of science
Search
Sign In
Create Free Account
Model-driven security
Known as:
Model-driven
Model-driven security (MDS) means applying model-driven approaches (and especially the concepts behind model-driven software development) to security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authorization
DevOps
Discretionary access control
Mandatory access control
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An agile model-driven method for involving end-users in DSL development
Villanueva del Pozo
,
M. Jose
2016
Corpus ID: 112407262
Domain-specific languages (DSLs) are considered to be a powerful tool for enhancing the efficiency of software developers and…
Expand
2014
2014
Towards a Homogeneous Characterization of the Model-Driven Web Development Methodologies
Francisco José Domínguez Mayo
,
María José Escalona Cuaresma
,
Manuel Mejías Risoto
,
M. Ross
,
G. Staples
Journal of Web Engineering
2014
Corpus ID: 16397799
In recent years a large number of Model-Driven Web development approaches have been designed and are being applied with success…
Expand
2013
2013
Evaluating A Uml-Based Modeling Framework For Process-Related Security Properties: A Qualitative Multi-Method Study
Sigrid Schefer-Wenzl
,
Stefan Sobernig
,
Mark Strembeck
European Conference on Information Systems
2013
Corpus ID: 6099046
In recent years, we developed a modeling framework for process-related security properties, the BusinessActivities Framework…
Expand
2011
2011
Model-driven security for Web services in e-Government system: Ideal and real
Zhendong Ma
,
Christian Wagner
,
T. Bleier
International Conference on Next Generation Web…
2011
Corpus ID: 16736849
Web services facilitate agile development and deployment of new services in e-Government systems. Due to their distributed nature…
Expand
2010
2010
Investigation of spatio-temporal dependencies in neuronal functional connectivity
M. C. Spencer
,
D. Xydas
,
+5 authors
S. Nasuto
IEEE 9th International Conference on Cyberntic…
2010
Corpus ID: 17114678
Determining how the functional connectivity in cortical cultures on multi-electrode arrays develops over time can provide new and…
Expand
Review
2008
Review
2008
Towards an Integrated Framework for Model-Driven Security Engineering
Jordi Cabot
,
Nicola Zannone
MODSEC@MoDELS
2008
Corpus ID: 14911743
Security is a major issue in developing software systems. It is widely recognized that security aspects must be considered in all…
Expand
2008
2008
Managing business compliance using model-driven security management
U. Lang
,
R. Schreiner
Information Security Solutions Europe
2008
Corpus ID: 3201258
Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This…
Expand
2005
2005
Integration and analysis of functional and non-functional aspects in model-driven e-service development
H. Jonkers
,
M. Iacob
,
M. Lankhorst
,
P. Strating
IEEE International Enterprise Distributed Object…
2005
Corpus ID: 18490500
In this paper we propose an approach for the integration of functional models with non-functional models in the context of model…
Expand
2004
2004
Applying MDA in Enterprise Application Interoperability: The PRAXIS Project ¶
Vassilios Karakoidas
,
Stephanos Androutsellis-Theotokis
,
D. Spinellis
,
Y. Charalabidis
2004
Corpus ID: 14205773
This paper elaborates on the application of the MDA approach for achieve interoperability among existing Enterprise Applications…
Expand
2003
2003
Model Driven Security Model Driven Security
M. Buchheit
,
B. Hollunder
2003
Corpus ID: 18781005
We present Model Driven Security, a new approach to building secure systems. In Model Driven Security, designers specify high…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required