2014
DOI: 10.1016/b978-0-12-800162-2.00003-8
|View full text |Cite
|
Sign up to set email alerts
|

Advances in Model-Driven Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 89 publications
0
14
0
Order By: Relevance
“…The book chapter [35] about model-driven security provides a detailed survey of a wide range of MDE approaches for designing secure systems, but does not cover the security of the MDE process itself.…”
Section: Model-driven Securitymentioning
confidence: 99%
“…The book chapter [35] about model-driven security provides a detailed survey of a wide range of MDE approaches for designing secure systems, but does not cover the security of the MDE process itself.…”
Section: Model-driven Securitymentioning
confidence: 99%
“…As far as service-based business process implementation is concerned, these works have led to different frameworks such as OpenPMF [14] or SECTET [15] that take advantage of the Model Driven Security engineering [16] to generate security policies depending on the requirements associated to the business process model. Nevertheless, none of them support the full transformation process: While BPSec [17] is focused on the requirement engineering part, including CIM (Computation Independent Model) and PIM (Platform Independent Model) models, SECTET and OpenPMF provide PIM, PSM (Platform Specific Model) and code generation features.…”
Section: Context and State Of The Artmentioning
confidence: 99%
“…4. As stated in Section II, different works on Model Driven Security [16] have been conducted to integrate security annota- tions in the process model specification. Nevertheless, none of them support the full transformation process nor the integration of multiple and dynamic contexts.…”
Section: B Performance Evaluationmentioning
confidence: 99%
“…Other surveys and systematic reviews are conducted by Basin et al [197], Kasal et al [208], Nguyen et al [209], Jensen and Jaatun [210], and Lucio et al [211].…”
Section: General Methods To Deal With Securitymentioning
confidence: 99%