Identity API v3 (CURRENT).
Online at https://developer.openstack.org/api-ref/identity/v3/.
Retrieved: 11.2017.
Jenny Abramov, Omer Anson, Michal Dahan, Peretz Shoval & Arnon Sturm (2012):
A methodology for integrating access control policies within database development.
computers & security 31(3),
pp. 299–314,
doi:10.1016/j.cose.2012.01.004.
MM Alam, Ruth Breu & Michael Breu (2004):
Model driven security for Web services (MDS4WS).
In: Multitopic Conference, 2004. Proceedings of INMIC 2004. 8th International.
IEEE,
pp. 498–505,
doi:10.1109/INMIC.2004.1492930.
Mohamed Almorsy, John Grundy & Amani S Ibrahim (2014):
Adaptable, model-driven security engineering for SaaS cloud-based applications.
Automated Software Engineering 21(2),
pp. 187–224,
doi:10.1007/s10515-013-0133-z.
Tim Berners-Lee, Roy Fielding & Henrik Frystyk (1996):
Hypertext transfer protocol–HTTP/1.0.
Ilinca Ciupa & Andreas Leitner (2005):
Automatic testing based on design by contract.
In: Proceedings of Net. ObjectDays 2005,
pp. 545–557,
doi:10.1.1.83.7881.
Guilan Dai, Xiaoying Bai, Yongbo Wang & Fengjun Dai (2007):
Contract-based testing for web services.
In: Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International 1.
IEEE,
pp. 517–526,
doi:10.1109/COMPSAC.2007.100.
Django Software Foundation (2010):
Django Documentation.
Online Documentation of Django 1.11.
https://www.djangoproject.com/.
Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee & Siv Hilde Houmb (2009):
An aspect-oriented methodology for designing secure applications.
Information and Software Technology 51(5),
pp. 846–864,
doi:10.1016/j.infsof.2008.05.004.
A. Holovaty & J. Kaplan-Moss (2010):
The Django Book.
Online version of The Django Book.
http://docs.djangoproject.com/en/1.2/.
Adrian Holovaty & Jacob Kaplan-Moss (2009):
The definitive guide to Django: Web development done right.
Apress,
doi:10.1007/978-1-4302-1937-8.
Jan Jürjens (2001):
Towards development of secure systems using UMLsec.
In: International Conference on Fundamental Approaches to Software Engineering.
Springer,
pp. 187–200,
doi:10.1007/3-540-45314-8_14.
Jan Jürjens & Pasha Shabalin (2007):
Tools for secure systems development with UML.
International Journal on Software Tools for Technology Transfer 9(5-6),
pp. 527–544,
doi:10.1007/s10009-007-0048-8.
Linas Laibinis, Elena Troubitsyna, Inna Pereverzeva, Ian Oliver & Silke Holtmanns (2016):
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks.
In: International Conference on Formal Engineering Methods.
Springer,
pp. 141–158,
doi:10.1007/978-3-319-47846-3_10.
Peter Mell & Tim Grance (2011):
The NIST definition of cloud computing,
doi:10.6028/NIST.SP.800-145.
Phu H Nguyen, Max Kramer, Jacques Klein & Yves Le Traon (2015):
An extensive systematic review on the Model-Driven Development of secure systems.
Information and Software Technology 68,
pp. 62–81,
doi:10.1016/j.infsof.2015.08.006.
OMG (2006):
OCL, OMG Available Specification, Version 2.0.
Ken Pepple (2011):
Deploying openstack.
" O'Reilly Media, Inc.".
Ivan Porres & Irum Rauf (2010):
From nondeterministic UML protocol statemachines to class contracts.
In: Software Testing, Verification and Validation (ICST), 2010 Third International Conference on.
IEEE,
pp. 107–116,
doi:10.1109/ICST.2010.62.
Ivan Porres & Irum Rauf (2011):
Modeling behavioral RESTful web service interfaces in UML.
In: Proceedings of the 2011 ACM Symposium on Applied Computing.
ACM,
pp. 1598–1605,
doi:10.1145/1982185.1982521.
Irum Rauf & Ivan Porres (2011):
Beyond CRUD.
In: REST: From Research to Practice.
Springer,
pp. 117–135,
doi:10.1007/978-1-4419-8303-9_5.
Leonard Richardson & Sam Ruby (2008):
RESTful web services.
O'Reilly.
Omar Sefraoui, Mohammed Aissaoui & Mohsine Eleuldj (2012):
OpenStack: toward an open-source solution for cloud computing.
International Journal of Computer Applications 55(3),
doi:10.5120/8738-2991.
Elena Troubitsyna (2016):
An Integrated Approach to Deriving Safety and Security Requirements from Safety Cases.
In: Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual 2.
IEEE,
pp. 614–615,
doi:10.1109/COMPSAC.2016.58.
Elena Troubitsyna, Linas Laibinis, Inna Pereverzeva, Tuomas Kuismin, Dubravka Ilic & Timo Latvala (2016):
Towards Security-Explicit Formal Modelling of Safety-Critical Systems.
In: International Conference on Computer Safety, Reliability, and Security.
Springer,
pp. 213–225,
doi:10.1007/978-3-319-24249-1_23.