Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,293,887 papers from all fields of science
Search
Sign In
Create Free Account
UMLsec
UMLsec is an extension to the Unified Modelling Language for integrating security related information in UML specifications. This information can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Access control
Confidentiality
Role-based access control
Broader (1)
Unified Modeling Language
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Modelling Security of Critical Infrastructures: A Survivability Assessment
Ricardo J. Rodríguez
,
José Merseguer
,
Simona Bernardi
Computer/law journal
2015
Corpus ID: 17860956
Critical infrastructures, usually designed to handle disruptions caused by human errors or random acts of nature, define assets…
Expand
2015
2015
Transforming Graphical System Models to Graphical Attack Models
M. Ivanova
,
Christian W. Probst
,
René Rydhof Hansen
,
F. Kammüller
GraMSec@CSF
2015
Corpus ID: 264747598
Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and…
Expand
2014
2014
Advances in Model-Driven Security
L. Lucio
,
Qin Zhang
,
+4 authors
Y. L. Traon
Advances in Computing
2014
Corpus ID: 2736739
2011
2011
UML-Based Modeling of Non-Functional Requirements in Telecommunication Systems
Mehrdad Saadatmand
,
A. Cicchetti
,
Mikael Sjödin
International Conference on Software Engineering…
2011
Corpus ID: 601628
Successful design of real-time embedded systems relies heavily on the successful satisfaction of their non-functional…
Expand
Highly Cited
2009
Highly Cited
2009
Modelling Reusable Security Requirements based on an Ontology Framework
J. Lasheras
,
R. Valencia-García
,
J. Fernández-breis
,
J. Álvarez
Journal of Research and Practice in Information…
2009
Corpus ID: 6335489
In recent years, security in Information Systems (IS) has become an important issue, and needs to be taken into account in all…
Expand
2009
2009
Improving the Classification of Security Patterns
H. Washizaki
,
E. Fernández
,
Katsuhisa Maruyama
,
Atsuto Kubo
,
Nobukazu Yoshioka
20th International Workshop on Database and…
2009
Corpus ID: 1102372
There are a large number of security patterns encapsulating reusable solutions to recurrent security problems. However, catalogs…
Expand
2008
2008
A QoS and Security Adaptation Model for Autonomic Pervasive Systems
M. Alia
,
M. Lacoste
32nd Annual IEEE International Computer Software…
2008
Corpus ID: 14935503
The unpredictable fluctuations in computing resources, contexts, and user preferences that characterize pervasive environments…
Expand
2005
2005
Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems
H. Mouratidis
,
M. Weiss
,
P. Giorgini
International Conference on Conceptual Modeling
2005
Corpus ID: 17218779
Agent Oriented Software Engineering and security patterns have been proposed as suitable paradigms for the development of secure…
Expand
2004
2004
Risk-Driven Development Of Security-Critical Systems Using UMLsec
J. Jürjens
,
S. Houmb
IFIP Congress Tutorials
2004
Corpus ID: 17344128
Despite a growing awareness of security issues in distributed computing systems, most development processes used today still do…
Expand
Highly Cited
2001
Highly Cited
2001
Towards Development of Secure Systems Using UMLsec
J. Jürjens
Fundamental Approaches to Software Engineering
2001
Corpus ID: 29032528
We show how UML (the industry standard in object-oriented modelling) can be used to express security requirements during system…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required