@article(basin:06:mds, author = "David Basin and J\"{u}rgen Doser and Torsten Lodderstedt", year = "2006", title = "Model Driven Security: From UML Models to Access Control Infrastructures", journal = "ACM Trans. Softw. Eng. Methodol.", volume = "15", number = "1", pages = "39--91", doi = "10.1145/1125808.1125810", ) @inproceedings(BertolissiC:ppdp, author = "Clara Bertolissi and Maribel Fern\'{a}ndez", year = "2008", title = "A Rewriting Framework for the Composition of Access Control Policies", booktitle = "Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming", series = "PPDP '08", publisher = "ACM", address = "New York, NY, USA", pages = "217--225", doi = "10.1145/1389449.1389476", ) @article(bodden:12:clara, author = "Eric Bodden and Patrick Lam and Laurie Hendren", year = "2012", title = "Partially Evaluating Finite-State Runtime Monitors Ahead of Time", journal = "ACM Trans. Program. Lang. Syst.", volume = "34", number = "2", pages = "7:1--7:52", doi = "10.1145/2220365.2220366", ) @incollection(BonattiS03, author = "Piero A. Bonatti and Pierangela Samarati", year = "2004", title = "Logics for Authorizations and Security", editor = "Jan Chomicki and Ron van der Meyden and Gunter Saake", booktitle = "Logics for Emerging Applications of Databases", publisher = "Springer Berlin Heidelberg", pages = "277--323", doi = "10.1007/978-3-642-18690-5\@uscore .8", ) @article(bovet:08:antlrworks, author = "Jean Bovet and Terence Parr", year = "2008", title = "ANTLRWorks: An ANTLR Grammar Development Environment", journal = "Softw. Pract. Exper.", volume = "38", number = "12", pages = "1305--1332", doi = "10.1002/spe.v38:12", ) @book(buschmann:96:posa, author = "Frank Buschmann and Regine Meunier and Hans Rohnert and Peter Sommerlad and Michael Stal", year = "1996", title = "Pattern-oriented Software Architecture: A System of Patterns", publisher = "John Wiley \& Sons, Inc.", address = "New York, NY, USA", ) @inproceedings(fer:92:rbac, author = "David Ferraiolo and Richard Kuhn", year = "1992", title = "Role-Based Access Control", booktitle = "In 15th NIST-NCSC National Computer Security Conference", pages = "554--563", ) @article(fer:01:rbacstandard, author = "David F. Ferraiolo and Ravi Sandhu and Serban Gavrila and D. Richard Kuhn and Ramaswamy Chandramouli", year = "2001", title = "Proposed NIST Standard for Role-based Access Control", journal = "ACM Trans. Inf. Syst. Secur.", volume = "4", number = "3", pages = "224--274", doi = "10.1145/501978.501980", ) @misc(eclipse, author = "The Eclipse Foundation", title = "Eclipse", url = "http://www.eclipse.org", ) @book(gosling:05:jls, author = "James Gosling and Bill Joy and Guy Steele and Gilad Bracha", year = "2005", title = "Java(TM) Language Specification, The (3rd Edition) (Java (Addison-Wesley))", publisher = "Addison-Wesley Professional", ) @book(gupta:jee, author = "Arun Gupta", year = "2013", title = "Java EE 7 Essentials", publisher = "O'Reilly Media", ) @article(hamlen:06:ccem, author = "Kevin W. Hamlen and Greg Morrisett and Fred B. Schneider", year = "2006", title = "Computability Classes for Enforcement Mechanisms", journal = "ACM Trans. Program. Lang. Syst.", volume = "28", number = "1", pages = "175--205", doi = "10.1145/1111596.1111601", ) @article(krasner:88:mvc, author = "Glenn E. Krasner and Stephen T. Pope", year = "1988", title = "A Cookbook for Using the Model-view Controller User Interface Paradigm in Smalltalk-80", journal = "J. Object Oriented Program.", volume = "1", number = "3", pages = "26--49", url = "http://dl.acm.org/citation.cfm?id=50757.50759", ) @inproceedings(priebe:04:pattern, author = "Torsten Priebe and Eduardo B. Fernandez and Jens I. Mehlau and G{\"u}nther Pernul", year = "2004", title = "A pattern system for access control", booktitle = "Research Directions In Data and Applications Security XVIII", publisher = "Kluwer", pages = "25--28", doi = "10.1007/1-4020-8126-6\@uscore .16", ) @phdthesis(SantanaA:phd, author = "A. {Santana de Oliveira}", year = "2008", title = "{\em R\'e\'ecriture et Modularit\'e pour les Politiques de S\'ecurit\'e}", school = "Universit\'e Henri Poincare", address = "Nancy, France", ) @article(SohrK:Isabelle, author = "Karsten Sohr and Michael Drouineaud and Gail-Joon Ahn and Martin Gogolla", year = "2008", title = "Analyzing and Managing Role-Based Access Control Policies", journal = "IEEE Transactions on Knowledge and Data Engineering", volume = "20", number = "7", pages = "924--939", doi = "10.1109/TKDE.2008.28", ) @book(steel:06:csp, author = "Christopher Steel and Ramesh Nagappan and Ray Lai", year = "2006", title = "{Core security patterns: Best practices and strategies for J2EE, Web services, and identity management}", series = "Prentice Hall Core Series", publisher = "Prentice-Hall", url = "http://www.coresecuritypatterns.com/", ) @inproceedings(zarnett:10:annot, author = "Jeff Zarnett and Mahesh Tripunitara and Patrick Lam", year = "2010", title = "Role-based Access Control (RBAC) in Java via Proxy Objects Using Annotations", booktitle = "Proceedings of the 15th ACM Symposium on Access Control Models and Technologies", series = "SACMAT '10", publisher = "ACM", address = "New York, NY, USA", pages = "79--88", doi = "10.1145/1809842.1809858", )