共 50 条
- [1] Model Checking of Security-Critical Applications in a Model-Driven Approach [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 76 - 90
- [2] Generating Formal Specifications for Security-Critical Applications - A Model-Driven Approach [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 68 - 74
- [3] Integration and Exchangeability of External Security-Critical Web Services in a Model-Driven Approach [J]. ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 63 - 73
- [4] A Model-Driven Approach to Web Applications [J]. DATABASES AND INFORMATION SYSTEMS IX, 2016, 291 : 73 - 86
- [5] A Model-Driven approach to Information Security Compliance [J]. APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2017, 1836
- [6] A Model-driven Approach to Trace Checking of Temporal Properties with Aggregations [J]. JOURNAL OF OBJECT TECHNOLOGY, 2019, 18 (02):
- [7] Trusted Compliance Checking on Blockchain with Commitments: A Model-Driven Approach [J]. BUSINESS PROCESS MANAGEMENT FORUM, BPM 2023 FORUM, 2023, 490 : 3 - 19
- [8] A Model-driven Approach to Representing and Checking RBAC Contextual Policies [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 243 - 253
- [9] A security model for an operating system for security-critical applications in small office and home environment [J]. Communications - Scientific Letters of the University of Žilina, 2009, 11 (03):
- [10] A usability model for mobile applications generated with a model-driven approach [J]. International Journal of Advanced Computer Science and Applications, 2019, 10 (02): : 140 - 146