Information Technology Reference
In-Depth Information
Gartner. (2007). Gartner says worldwide PDA
shipments top 17.7 Million in 2006 . Gartner Press
Release. Retrieved from http://www.gartner.com/
it/page.jsp?id=500898
Jacobson, I., Booch, G., & Rumbaugh, J. (1999).
The unified software development process .
Addison-Wesley Professional.
Jameel, H., Kalim, U., Sajjad, A., Lee, S., & Jeon,
T. (2005). Mobile-to-Grid middleware: Bridging
the gap between mobile and Grid environments .
Paper presented at the European Grid Conference
EGC 2005, Amsterdam, The Netherlands.
Gartner. (2009). Gartner says worldwide mobile
phone sales declined 8.6 per cent and smartphones
grew 12.7 per cent in first quarter of 2009 . Gartner
Press Release. Retrieved from http://www.gartner.
com/it/page.jsp?id=985912
Jana, D., Chaudhuri, A., & Bhaumik, N. B. (2009).
Privacy and anonymity protection in computa-
tional Grid services. International Journal of
Computer Science and Applications , 6 (1), 98-107.
Georg, G., Ray, I., Anastasakis, K., Bordbar,
B., Toahchoodee, M., & Houmb, S. H. (2009).
An aspect-oriented methodology for designing
secure applications. Information and Software
Technology , 51 (5), 846-864. doi:10.1016/j.
infsof.2008.05.004
Jurjens, J. (2001). Towards development of secure
systems using UMLsec . Paper presented at the
Fundamental Approaches to Software Engineer-
ing (FASE/ETAPS).
Giorgini, P., Mouratidis, H., & Zannone, N. (2007).
Modelling security and trust with secure tropos.
In Giorgini, H. M. P. (Ed.), Integrating security
and software engineering: Advances and future
visions (pp. 160-189). Hershey, PA: Idea Group
Publishing.
Jurjens, J. (2002). UMLsec: Extending UML for
secure systems development . Paper presented at
the 5th International Conference on the Unified
Modeling Language (UML), Dresden, Germany.
Jürjens, J. (2005). Secure systems development
with UML . Springer.
Graham, D. (2006). Introduction to the CLASP
process . Retrieved from https://buildsecurityin.
us-cert.gov/daisy/bsi/articles/best-practices/re-
quirements/548.html
Jürjens, J., Schreck, J., & Bartmann, P. (2008).
Model-based security analysis for mobile com-
munications . Paper presented at the International
Conference on Software Engineering, Leipzig,
Germany.
Guan, T., Zaluska, E., & Roure, D. D. (2005). A
Grid service infrastructure for mobile devices .
Paper presented at the First International Confer-
ence on Semantics, Knowledge, and Grid (SKG
2005), Beijing, China.
Kolonay, R., & Sobolewski, M. (2004). Grid
interactive service-oriented programming en-
vironment . Paper presented at the Concurrent
Engineering: The Worldwide Engineering Grid,
Tsinghua, China.
Herveg, J., Crazzolara, F., Middleton, S. E., Mar-
vin, D. J., & Poullet, Y. (2004). GEMSS: Privacy
and security for a medical Grid . Paper presented at
the HealthGRID 2004, Clermont-Ferrand, France.
Kruchten, P. (2000). The rational unified process:
An introduction (2nd ed.). Addison-Wesley.
Humphrey, M., Thompson, M. R., & Jackson, K.
R. (2005). Security for Grids . Lawrence Berkeley
National Laboratory. (Paper LBNL-54853).
Search WWH ::




Custom Search