Integrating Security and Software Engineering: Advances and Future Vision, 2006. ,
DOI : 10.4018/978-1-59904-147-6
Applying Aspect-Oriented Programming to Security, Cutter IT Journal, vol.14, issue.2, pp.31-39, 2001. ,
An aspect-oriented methodology for designing secure applications, Special Issue: Model-Driven Development for Secure Information Systems, pp.846-864, 2009. ,
DOI : 10.1016/j.infsof.2008.05.004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.526
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML, of Studies in Computational Intelligence, pp.197-213, 2010. ,
DOI : 10.1007/978-3-642-13273-5_13
Structured design, IBM Systems Journal, vol.13, issue.2, pp.115-139, 1974. ,
DOI : 10.1147/sj.132.0115
Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks, 2008. ,
Automated Encapsulation of UML Activities for Incremental Development and Verification, Proceedings of the 12th Int. Conference on Model Driven Engineering, Languages and Systems (MoDELS), 2009. ,
DOI : 10.1007/3-540-45102-1_14
Reactive Semantics for Distributed UML Activities, LNCS, vol.6117, pp.17-31, 2010. ,
DOI : 10.1007/978-3-642-13464-7_3
URL : https://hal.archives-ouvertes.fr/hal-01055149
Tool support for the rapid composition, analysis and implementation of reactive services, Journal of Systems and Software, vol.82, issue.12, pp.2068-2080, 2009. ,
DOI : 10.1016/j.jss.2009.06.057
Design Patterns: Elements of Reusable Object-Oriented Software, 1995. ,
The OAuth 2.0 Authorization Protocol, Internet-Draft, pp.2-22, 2011. ,
The Transport Layer Security (TLS) Protocol Version 1.2, RFC, vol.5246, 2008. ,
DOI : 10.17487/rfc5246
Simple Authentication and Security Layer (SASL), RFCProposed Standard), vol.4422, 2006. ,
DOI : 10.17487/rfc4422
Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2, 2005. ,
Transforming Collaborative Service Specifications into Efficiently Executable State Machines, Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT, 2007. ,
Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, Proceedings of the 8th International Symposium on Distributed Objects and Applications (DOA), pp.1613-1632, 2006. ,
DOI : 10.1007/11914952_41
Contracts for Multi-instance UML Activities, pp.304-318, 2011. ,
DOI : 10.1007/3-540-48153-2_6
The existence of refinement mappings, Theoretical Computer Science, vol.82, issue.2, pp.253-284, 1991. ,
DOI : 10.1016/0304-3975(91)90224-P
Dynamic Secure Aspect Modeling with UML: From Models to Code, International Conference on Model Driven Engineering Languages and Systems, MoDELS 2005, pp.142-155, 2005. ,
DOI : 10.1007/11557432_11
Enchancing UML to Model Custom Security Aspects, AOM '07: Proceedings of the 11th Workshop on Aspect- Oriented Modeling, 2007. ,
Model driven design and aspect weaving, Software & Systems Modeling, vol.33, issue.4, pp.209-218, 2008. ,
DOI : 10.1007/s10270-008-0080-5
Challenges of Aspect-oriented Technology, Workshop on Software Quality, 24th Int'l Conf. Software Engineering, 2002. ,
Secure System Development with UML, 2004. ,
Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.39-91, 2006. ,
DOI : 10.1145/1125808.1125810
MAC and UML for secure software design, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.75-85, 2004. ,
DOI : 10.1145/1029133.1029144
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.1628