2012
DOI: 10.1016/j.cose.2012.01.004
|View full text |Cite
|
Sign up to set email alerts
|

A methodology for integrating access control policies within database development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“… Using security patterns: Many research works such as (Uzunov et al, 2015), (Abramov et al, 2012a) and (Nguyen et al, 2015) focus on integrating security patterns with software development and engineering methodologies to create new approaches or to improve pre-existing methods.  Security pattern application: Another group of research works have focused on the techniques relating to the selection and application of appropriate security patterns using manual or automatic approaches (Guan et al, 2016), (Motii et al, 2016a), (Bouaziz and Kammoun, 2015).…”
Section: The Pattern Usage Categorymentioning
confidence: 99%
See 1 more Smart Citation
“… Using security patterns: Many research works such as (Uzunov et al, 2015), (Abramov et al, 2012a) and (Nguyen et al, 2015) focus on integrating security patterns with software development and engineering methodologies to create new approaches or to improve pre-existing methods.  Security pattern application: Another group of research works have focused on the techniques relating to the selection and application of appropriate security patterns using manual or automatic approaches (Guan et al, 2016), (Motii et al, 2016a), (Bouaziz and Kammoun, 2015).…”
Section: The Pattern Usage Categorymentioning
confidence: 99%
“…Our statistics, based on the results of the SMS, indicate that distributed and cloud architectures are respectively responsible for 6% and 8% of research efforts in the usage category. There are also multiple studies which have focused on the usage of security patterns in environments such as embedded systems (Hamid et al, 2013), software defined networking (Petroulakis et al, 2016), web applications (Rosado et al, 2006) and database (Abramov et al, 2012a). The complete list of papers for this analysis, along with the respective collected data, can be found in SupMat→Tables 3.13 and 3.14.…”
Section: Environments For Investigating Pattern Usage (Rq10)mentioning
confidence: 99%
“…UML has been used much to model security concerns. Some approaches use only UML (e.g., [4], MDSE@R [6], AOMSec [11] etc.) and some use UML profiles(e.g., SECTET [5],UMLsec [14], etc.…”
Section: Related Workmentioning
confidence: 99%
“…That is, we excluded from the study those papers that are not published at top-tier venues. In particular, we considered conferences that are rated as "A" or higher and journals that are rated "B" or higher by the Excellence in Research for Australia (ERA) initiative 1 . We assume that most interesting and promising notations wind up being published in top-tier venues eventually.…”
Section: Collection Of the Papersmentioning
confidence: 99%