@misc(urllib, title = {20.6. urllib2 — extensible library for opening URLs — Python 2.7.14 documentation}, howpublished = {\url{https://docs.python.org/2/library/urllib2.html}}, note = {(Accessed on 18/10/2017)}, ) @(authLink, title = {{HTTP Authentication}}, howpublished = {\url{http://www.httpwatch.com/httpgallery/authentication/}}, note = {Accessed: 20.08.2013}, ) @(ksapi, title = {{Identity API v3 (CURRENT)}}, howpublished = {Online at https://developer.openstack.org/api-ref/identity/v3/}, note = {Retrieved: 11.2017}, ) @article(abramov2012methodology, author = {Jenny Abramov and Omer Anson and Michal Dahan and Peretz Shoval and Arnon Sturm}, year = {2012}, title = {A methodology for integrating access control policies within database development}, journal = {computers \& security}, volume = {31}, number = {3}, pages = {299--314}, doi = {10.1016/j.cose.2012.01.004}, ) @inproceedings(alam2004model, author = {MM Alam and Ruth Breu and Michael Breu}, year = {2004}, title = {Model driven security for Web services (MDS4WS)}, booktitle = {Multitopic Conference, 2004. Proceedings of INMIC 2004. 8th International}, organization = {IEEE}, pages = {498--505}, doi = {10.1109/INMIC.2004.1492930}, ) @article(almorsy2014adaptable, author = {Mohamed Almorsy and John Grundy and Amani S Ibrahim}, year = {2014}, title = {Adaptable, model-driven security engineering for SaaS cloud-based applications}, journal = {Automated Software Engineering}, volume = {21}, number = {2}, pages = {187--224}, doi = {10.1007/s10515-013-0133-z}, ) @misc(berners1996hypertext, author = {Berners-Lee, Tim and Roy Fielding and Henrik Frystyk}, year = {1996}, title = {{Hypertext transfer protocol--HTTP/1.0}}, ) @inproceedings(ciupa2005automatic, author = {Ilinca Ciupa and Andreas Leitner}, year = {2005}, title = {Automatic testing based on design by contract}, booktitle = {Proceedings of Net. ObjectDays}, volume = {2005}, pages = {545--557}, doi = {10.1.1.83.7881}, ) @inproceedings(dai2007contract, author = {Guilan Dai and Xiaoying Bai and Yongbo Wang and Fengjun Dai}, year = {2007}, title = {Contract-based testing for web services}, booktitle = {Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International}, volume = {1}, organization = {IEEE}, pages = {517--526}, doi = {10.1109/COMPSAC.2007.100}, ) @article(djdoc, author = {Django Software Foundation}, year = {2010}, title = {{Django Documentation}}, journal = {Online Documentation of Django 1.11}, note = {\url{https://www.djangoproject.com/}}, ) @article(georg2009aspect, author = {Geri Georg and Indrakshi Ray and Kyriakos Anastasakis and Behzad Bordbar and Manachai Toahchoodee and Siv Hilde Houmb}, year = {2009}, title = {An aspect-oriented methodology for designing secure applications}, journal = {Information and Software Technology}, volume = {51}, number = {5}, pages = {846--864}, doi = {10.1016/j.infsof.2008.05.004}, ) @article(djbook, author = {A. Holovaty and Kaplan-Moss, J.}, year = {2010}, title = {{The Django Book}}, journal = {Online version of The Django Book}, note = {\url{http://docs.djangoproject.com/en/1.2/}}, ) @book(holovaty2009definitive, author = {Adrian Holovaty and Kaplan-Moss, Jacob}, year = {2009}, title = {The definitive guide to Django: Web development done right}, publisher = {Apress}, doi = {10.1007/978-1-4302-1937-8}, ) @inproceedings(jurjens2001towards, author = {Jan J{\"u}rjens}, year = {2001}, title = {Towards development of secure systems using UMLsec}, booktitle = {International Conference on Fundamental Approaches to Software Engineering}, organization = {Springer}, pages = {187--200}, doi = {10.1007/3-540-45314-8\_14}, ) @article(jurjens2007tools, author = {Jan J{\"u}rjens and Pasha Shabalin}, year = {2007}, title = {Tools for secure systems development with UML}, journal = {International Journal on Software Tools for Technology Transfer}, volume = {9}, number = {5-6}, pages = {527--544}, doi = {10.1007/s10009-007-0048-8}, ) @inproceedings(laibinis2016formal, author = {Linas Laibinis and Elena Troubitsyna and Inna Pereverzeva and Ian Oliver and Silke Holtmanns}, year = {2016}, title = {A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks}, booktitle = {International Conference on Formal Engineering Methods}, organization = {Springer}, pages = {141--158}, doi = {10.1007/978-3-319-47846-3\_10}, ) @article(mell2011nist, author = {Peter Mell and Tim Grance}, year = {2011}, title = {The NIST definition of cloud computing}, doi = {10.6028/NIST.SP.800-145}, ) @article(nguyen2015extensive, author = {Phu H Nguyen and Max Kramer and Jacques Klein and Le Traon, Yves}, year = {2015}, title = {An extensive systematic review on the Model-Driven Development of secure systems}, journal = {Information and Software Technology}, volume = {68}, pages = {62--81}, doi = {10.1016/j.infsof.2015.08.006}, ) @manual(OMG_OCL2, author = {{OMG}}, year = {2006}, title = {OCL, OMG Available Specification, Version 2.0}, ) @book(pepple2011deploying, author = {Ken Pepple}, year = {2011}, title = {Deploying openstack}, publisher = {" O'Reilly Media, Inc."}, ) @inproceedings(porres2010nondeterministic, author = {Ivan Porres and Irum Rauf}, year = {2010}, title = {From nondeterministic UML protocol statemachines to class contracts}, booktitle = {Software Testing, Verification and Validation (ICST), 2010 Third International Conference on}, organization = {IEEE}, pages = {107--116}, doi = {10.1109/ICST.2010.62}, ) @inproceedings(porres2011modeling, author = {Ivan Porres and Irum Rauf}, year = {2011}, title = {Modeling behavioral RESTful web service interfaces in UML}, booktitle = {Proceedings of the 2011 ACM Symposium on Applied Computing}, organization = {ACM}, pages = {1598--1605}, doi = {10.1145/1982185.1982521}, ) @incollection(rauf2011beyond, author = {Irum Rauf and Ivan Porres}, year = {2011}, title = {Beyond CRUD}, booktitle = {REST: From Research to Practice}, publisher = {Springer}, pages = {117--135}, doi = {10.1007/978-1-4419-8303-9\_5}, ) @book(rwsbook, author = {Leonard Richardson and Sam Ruby}, year = {2008}, title = {RESTful web services}, publisher = {O'Reilly}, ) @article(sefraoui2012OpenStack, author = {Omar Sefraoui and Mohammed Aissaoui and Mohsine Eleuldj}, year = {2012}, title = {OpenStack: toward an open-source solution for cloud computing}, journal = {International Journal of Computer Applications}, volume = {55}, number = {3}, doi = {10.5120/8738-2991}, ) @inproceedings(troubitsyna2016integrated, author = {Elena Troubitsyna}, year = {2016}, title = {An Integrated Approach to Deriving Safety and Security Requirements from Safety Cases}, booktitle = {Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual}, volume = {2}, organization = {IEEE}, pages = {614--615}, doi = {10.1109/COMPSAC.2016.58}, ) @inproceedings(troubitsyna2016towards, author = {Elena Troubitsyna and Linas Laibinis and Inna Pereverzeva and Tuomas Kuismin and Dubravka Ilic and Timo Latvala}, year = {2016}, title = {Towards Security-Explicit Formal Modelling of Safety-Critical Systems}, booktitle = {International Conference on Computer Safety, Reliability, and Security}, organization = {Springer}, pages = {213--225}, doi = {10.1007/978-3-319-24249-1\_23}, ) @techreport(uml20112, author = {OMG UML}, year = {2011}, title = {2.4. 1 superstructure specification}, type = {Technical Report}, institution = {document formal/2011-08-06. Technical report, OMG}, )