2010
DOI: 10.1016/j.infsof.2010.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Secure Mobile Grid Systems: A systematic approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…Pavlidis et al (2012) use trust based concepts such as resolution, trust, trust relationship, and entailment to support analysis and modelling of security. Rosado et al (2010) demonstrate an activity for elicitation, analysis and modelling of security and functional requirements (Rosado et al, 2010), where Security is considered as sub -factor of software quality. The work systematically uses SPEM 2.0 to define the tasks and integrate the artefacts for the security analysis.…”
Section: Security and Privacy Requirements Elicitation And Analysismentioning
confidence: 99%
“…Pavlidis et al (2012) use trust based concepts such as resolution, trust, trust relationship, and entailment to support analysis and modelling of security. Rosado et al (2010) demonstrate an activity for elicitation, analysis and modelling of security and functional requirements (Rosado et al, 2010), where Security is considered as sub -factor of software quality. The work systematically uses SPEM 2.0 to define the tasks and integrate the artefacts for the security analysis.…”
Section: Security and Privacy Requirements Elicitation And Analysismentioning
confidence: 99%
“…In [39], a UML profile is proposed for defining security requirements for Data Warehouses (DW) at the business level. In the mobile Grid context, GridUCSecProfile is introduced in [40] and used in [41], where a methodology is proposed to analyse, design and construct a Secure Mobile Grid System. SecureUML [42] allows to build secure distributed systems.…”
Section: Related Workmentioning
confidence: 99%
“…This analysis model is based on use case models following the notation and modelling of the new UML profile defined for this purpose in which we can formally model all the information of the system in order to develop use case diagrams. In this activity, which has been defined in depth in [38], we build the use cases diagrams by following the steps and tasks described in the process. It is in the analysis activity tasks of "Building secure mobile Grid UC diagram" and "Identifying secure mobile Grid UC" that the UML profile is used to build use cases diagrams for mobile Grid systems.…”
Section: Extension For Specification Of Grid Use Cases For Secure Mobmentioning
confidence: 99%