Information Technology Reference
In-Depth Information
de Castilla-La Mancha” (Spain) and FEDER,
and MEDUSAS (IDI-20090557), BUSINESS
(PET2008-0136), PEGASO/MAGO (TIN2009-
13718-C02-01) and ORIGIN (IDI-2010043(1-5)
financed by the “Ministerio de Ciencia e Inno-
vación (CDTI)” (Spain). Special acknowledg-
ment to GREDIA (FP6-IST-034363) funded by
European Commission.
Castro, J., Kolp, M., & Mylopoulos, J. (2001). A
requirements-driven development methodology .
Paper presented at the 13th Int. Conf. on Advanced
Information Systems Engineering, CAiSE'01.
Dail, H., Sievert, O., Berman, F., & Casanova, H.
YarKhan, A., Vadhiyar, S., et al. (2004). Schedul-
ing in the Grid application development software
project. In Grid resource management: State of
the art and future trends (pp. 73-98).
REFERENCES
Enterprise Grid Alliance Security Working Group.
(2005). Enterprise Grid security requirements,
version 1.0.
Basin, D., & Doser, J. (2002). SecureUML: A
UML-based modeling language for model-driven
security. Paper presented at the 5th International
Conference on the Unified Modeling Language.
Lecture Notes in Computer Science 2460 .
Fernández-Medina, E., Jurjens, J., Trujillo, J., &
Jajodia, S. (2009). Special issue: Model-driven
development for secure Information Systems.
Information and Software Technology , 51 (5),
809-814. doi:10.1016/j.infsof.2008.05.010
Basin, D., Doser, J., & Lodderstedt, T. (2003).
Model driven security for process-oriented sys-
tems . Paper presented at the ACM Symposium
on Access Control Models and Technologies,
Como, Italy.
Fernández-Medina, E., & Piattini, M. (2005).
Designing secure databases. Information and Soft-
ware Technology , 47 (7), 463-477. doi:10.1016/j.
infsof.2004.09.013
Bellavista, P., & Corradi, A. (2006). The handbook
of mobile middleware . Auerbach Publications.
doi:10.1201/9781420013153
Firesmith, D. G. (2003). Security use cases. Jour-
nal of Object Technology , 53-64.
Flechais, I., Sasse, M. A., & Hailes, S. M. V. (2003).
Bringing security home: A process for developing
secure and usable systems . Paper presented at the
New Security Paradigms Workshop (NSPW'03),
Ascona, Switzerland.
Bhanwar, S., & Bawa, S. (2008). Securing a Grid .
Paper presented at the World Academy of Science,
Engineering and Technology.
Bradford, P. G., Grizzell, B. M., Jay, G. T., &
Jenkins, J. T. (2007). Cap. 4. Pragmatic security
for constrained wireless networks. In Xaio, Y.
(Ed.), Security in distributed, Grid, mobile, and
pervasive computing (p. 440). Tuscaloosa, USA:
The University of Alabama.
Foster, I., & Kesselman, C. (2004). The Grid2:
Blueprint for a future computing infrastructure
(2nd ed.). San Francisco, CA: Morgan Kaufmann
Publishers.
Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S.
(1998). A security architecture for computational
Grids . Paper presented at the 5th ACM Conference
on Computer and Communications Security, San
Francisco, USA.
Bresciani, P., Giorgini, P., Giunchiglia, F., My-
lopoulos, J., & Perin, A. (2004). TROPOS: An
agent-oriented software development methodol-
ogy. Journal of Autonomous Agents and Multi-
Agent Systems , 8 (3), 203-236. doi:10.1023/
B:AGNT.0000018806.20944.ef
Search WWH ::




Custom Search