Model-driven security

Model-driven security (MDS) means applying model-driven approaches (and especially the concepts behind model-driven software development) to security… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2012
01220052012

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
We have seen many efforts invested in research on engineering security aspects of software and systems over the last years, but… (More)
Is this relevant?
Review
2011
Review
2011
In model-driven development, system designs are specified using graphical modeling languages like UML and system artifacts such… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Web services facilitate agile development and deployment of new services in e-Government systems. Due to their distributed nature… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2010
Review
2010
a r t i c l e i n f o One of the most important aspects in the achievement of secure software systems in the software development… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2007
2007
Model-driven security is a framework to configure WS-security easily. It generates a security policy written in WS-security… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2006
2006
Large organizations need to align the security architecture across three different domains: access control, network layout and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
The emergence of Web services and service-oriented architecture (SOA) makes application development easy. However, since the… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2005
2005
The paradigm of service oriented architectures spreads throughout the domain of business software and enterprise networks. With… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?