Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
4.4 Notes
S.H. Houmb and J. Jürjens. Developing secure networked web-based systems using model-based risk assessment and UMLsec. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), page 488ff. IEEE Computer Society, New York, 2003.
J. Jürjens and J. Grünbauer. Critical systems development with UML: Overview with automotive case-study. In 4th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2003), pages 512–517. International Association for Computer and Information Science (ACIS), 2003.
J. Jürjens and S.K. Houmb. Risk-driven development of security-critical systems using UMLsec. Kluwer Academic, Dordrecht, 2004. Book chapter to be published (book title pending).
J. Jürjens, G. Popp, and G. Wimmel. Towards using security patterns in model-based system development. In 1th European Conference on Pattern Languages of Programs (EuroPLoP 2002), 2002. Security Focus Group.
J. Jürjens. Developing secure systems with UMLsec — from business processes to implementation. In D. Fox, M. Köhntopp, and A. Pfitzmann, editors, Verläßliche IT-Systeme 2001 (VIS 2001), DuD-Fachbeiträge. Vieweg, Wiesbaden, 2001.
J. Jürjens. Formal development and verification of security-critical systems with UML. In Workshop on Automated Verification of Critical Systems (AVoCS 2001), Oxford, 2001. Published as OUCL Technical Report PRG-RR-01-07. Available at ftp://ftp.comlab.ox.ac.uk/pub/Documents/techreports/RR-01-07.ps.gz.
J. Jürjens. Modelling audit security for smart-card payment schemes with UMLsec. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, pages 93–108. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2001. Proceedings of the 16th International Conference on Information Security (SEC 2001).
J. Jürjens. Secure Java development with UMLsec. In B. De Decker, F. Piessens, J. Smits, and E. Van Herrenweghen, editors, Advances in Network and Distributed Systems Security, pages 107–124. International Federation for Information Processing (IFIP) TC-11 WG 11.4, Kluwer Academic, Dordrecht, 2001. Proceedings of the First Annual Working Conference on Network Security (I-NetSec 2001).
J. Jürjens. Transformations for introducing patterns — a secure systems case study. In Workshop on Transformations in UML (WTUML, ETAPS 2001 Satellite Event), 2001.
J. Jürjens. Formal semantics for interacting UML subsystems. In B. Jacobs and A. Rensink, editors, 5th International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2002), pages 29–44. International Federation for Information Processing (IFIP), Kluwer Academic, Dordrecht, 2002.
J. Jürjens. Encapsulating rules of prudent security engineering. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols, volume 2467 of Lecture Notes in Computer Science, pages 95–101. Springer, Berlin Heidelberg New York, 2002. 9th International Workshop. Transcript of discussion on pages 102–106.
J. Jürjens. Methodische Entwicklung sicherer CORBA-Anwendungen. In P. Horster, editor, Enterprise Security. IT-Verlag, Sauerlach, 2002.
J. Jürjens. Secure systems development with UML — applications to telemedicine. In CORAS Public Workshop, 2002. International Conference on Telemedicine (ICT 2002). Invited talk.
J. Jürjens. UMLsec: Extending UML for secure systems development. In H. Hußmann, and S. Cook, editors. 5th International Conference on the Unified Modeling Language (UML 2002), volume 2460 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg New York, 2002. Jézéquel et al [JHC02], pages 412–425.
J. Jürjens. Using UMLsec and goal-trees for secure systems development. In H. Haddad, G. Papadopoulos, and B. Panda, editors. Proceedings of the 2002 Symposium of Applied Computing (SAC). ACM Press, 2002. Lamont et al [LHPP02], pages 1026–1031.
J. Jürjens. Developing safety-and security-critical systems with UML. In DARP workshop, 2003. Invited talk.
J. Jürjens. Model-based security with UMLsec. In UML Forum Tokyo, 2003. Invited talk.
J. Jürjens. Developing high-assurance secure systems with UML: An electronic purchase protocol. In Eighth IEEE International Symposium on High Assurance Systems Engineering (RASE 2004), pages 231–240. IEEE Computer Society, New York, 2004.
J. Jürjens. Developing security-critical applications with UMLsec — a short walk-through. Novatica, 168, March/April 2004.
J. Jürjens. Developing Security-Critical Systems with UML, 2004. Series of tutorials at 30 international conferences including OMG DOCsec 2002, IFIP SEC 2002, ETAPS 2003, OMG Workshop On UML for Enterprise Applications 2003, Formal Methods Symposium 2003, ASE 2003, FMOODS 2003, ECOOP 2004, and WCC 2004. Download of material at http://www4.in.tum.de/~juerjens/csdumltut.
J. Jürjens. Foundations for designing secure architectures. In First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, 2004.
J. Jürjens. Logic for security. In Spring School “Logic in Computer Science”, Venezia, 2004. Graduate school on Logic in Informatics, Munich.
J. Jürjens. Security in UML. In4th International School on Foundations of Security Analysis and Design (FOSAD 2004), 2004.
J. Jürjens. Security modeling with UML. Universidad Carlos III de Madrid, 2005.
G. Popp, J. Jürjens, G. Wimmel, and R. Breu. Security-critical system development with extended use cases. In 10th Asia-Pacific Software Engineering Conference (APSEC 2003), pages 478–487. IEEE Computer Society, New York, 2003.
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
(2005). Model-based Security Engineering with UML. In: Secure Systems Development with UML. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-26494-9_4
Download citation
DOI: https://doi.org/10.1007/3-540-26494-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00701-2
Online ISBN: 978-3-540-26494-1
eBook Packages: Computer ScienceComputer Science (R0)