References

  1. 20.6. urllib2 — extensible library for opening URLs — Python 2.7.14 documentation. https://docs.python.org/2/library/urllib2.html. (Accessed on 18/10/2017).
  2. HTTP Authentication. http://www.httpwatch.com/httpgallery/authentication/. Accessed: 20.08.2013.
  3. Identity API v3 (CURRENT). Online at https://developer.openstack.org/api-ref/identity/v3/. Retrieved: 11.2017.
  4. Jenny Abramov, Omer Anson, Michal Dahan, Peretz Shoval & Arnon Sturm (2012): A methodology for integrating access control policies within database development. computers & security 31(3), pp. 299–314, doi:10.1016/j.cose.2012.01.004.
  5. MM Alam, Ruth Breu & Michael Breu (2004): Model driven security for Web services (MDS4WS). In: Multitopic Conference, 2004. Proceedings of INMIC 2004. 8th International. IEEE, pp. 498–505, doi:10.1109/INMIC.2004.1492930.
  6. Mohamed Almorsy, John Grundy & Amani S Ibrahim (2014): Adaptable, model-driven security engineering for SaaS cloud-based applications. Automated Software Engineering 21(2), pp. 187–224, doi:10.1007/s10515-013-0133-z.
  7. Tim Berners-Lee, Roy Fielding & Henrik Frystyk (1996): Hypertext transfer protocol–HTTP/1.0.
  8. Ilinca Ciupa & Andreas Leitner (2005): Automatic testing based on design by contract. In: Proceedings of Net. ObjectDays 2005, pp. 545–557, doi:10.1.1.83.7881.
  9. Guilan Dai, Xiaoying Bai, Yongbo Wang & Fengjun Dai (2007): Contract-based testing for web services. In: Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International 1. IEEE, pp. 517–526, doi:10.1109/COMPSAC.2007.100.
  10. Django Software Foundation (2010): Django Documentation. Online Documentation of Django 1.11. https://www.djangoproject.com/.
  11. Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee & Siv Hilde Houmb (2009): An aspect-oriented methodology for designing secure applications. Information and Software Technology 51(5), pp. 846–864, doi:10.1016/j.infsof.2008.05.004.
  12. A. Holovaty & J. Kaplan-Moss (2010): The Django Book. Online version of The Django Book. http://docs.djangoproject.com/en/1.2/.
  13. Adrian Holovaty & Jacob Kaplan-Moss (2009): The definitive guide to Django: Web development done right. Apress, doi:10.1007/978-1-4302-1937-8.
  14. Jan Jürjens (2001): Towards development of secure systems using UMLsec. In: International Conference on Fundamental Approaches to Software Engineering. Springer, pp. 187–200, doi:10.1007/3-540-45314-8_14.
  15. Jan Jürjens & Pasha Shabalin (2007): Tools for secure systems development with UML. International Journal on Software Tools for Technology Transfer 9(5-6), pp. 527–544, doi:10.1007/s10009-007-0048-8.
  16. Linas Laibinis, Elena Troubitsyna, Inna Pereverzeva, Ian Oliver & Silke Holtmanns (2016): A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks. In: International Conference on Formal Engineering Methods. Springer, pp. 141–158, doi:10.1007/978-3-319-47846-3_10.
  17. Peter Mell & Tim Grance (2011): The NIST definition of cloud computing, doi:10.6028/NIST.SP.800-145.
  18. Phu H Nguyen, Max Kramer, Jacques Klein & Yves Le Traon (2015): An extensive systematic review on the Model-Driven Development of secure systems. Information and Software Technology 68, pp. 62–81, doi:10.1016/j.infsof.2015.08.006.
  19. OMG (2006): OCL, OMG Available Specification, Version 2.0.
  20. Ken Pepple (2011): Deploying openstack. " O'Reilly Media, Inc.".
  21. Ivan Porres & Irum Rauf (2010): From nondeterministic UML protocol statemachines to class contracts. In: Software Testing, Verification and Validation (ICST), 2010 Third International Conference on. IEEE, pp. 107–116, doi:10.1109/ICST.2010.62.
  22. Ivan Porres & Irum Rauf (2011): Modeling behavioral RESTful web service interfaces in UML. In: Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, pp. 1598–1605, doi:10.1145/1982185.1982521.
  23. Irum Rauf & Ivan Porres (2011): Beyond CRUD. In: REST: From Research to Practice. Springer, pp. 117–135, doi:10.1007/978-1-4419-8303-9_5.
  24. Leonard Richardson & Sam Ruby (2008): RESTful web services. O'Reilly.
  25. Omar Sefraoui, Mohammed Aissaoui & Mohsine Eleuldj (2012): OpenStack: toward an open-source solution for cloud computing. International Journal of Computer Applications 55(3), doi:10.5120/8738-2991.
  26. Elena Troubitsyna (2016): An Integrated Approach to Deriving Safety and Security Requirements from Safety Cases. In: Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual 2. IEEE, pp. 614–615, doi:10.1109/COMPSAC.2016.58.
  27. Elena Troubitsyna, Linas Laibinis, Inna Pereverzeva, Tuomas Kuismin, Dubravka Ilic & Timo Latvala (2016): Towards Security-Explicit Formal Modelling of Safety-Critical Systems. In: International Conference on Computer Safety, Reliability, and Security. Springer, pp. 213–225, doi:10.1007/978-3-319-24249-1_23.
  28. OMG UML (2011): 2.4. 1 superstructure specification. Technical Report. document formal/2011-08-06. Technical report, OMG.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org