EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Object Constraint Language"
Narrow search

Narrow search

Year of publication
Subject
All
UML 2 Antipatterns 1 Assessment 1 Business properties 1 Data security 1 Fault Injection 1 Forecasting model 1 LDAP 1 LDAP Query Injection 1 Misuse cases 1 Model quality 1 Object Constraint Language 1 Object Constraint Language (OCL) 1 Object constraint language 1 Prediction 1 Probabilistic inference 1 Probability theory 1 Prognoseverfahren 1 Quality improvement 1 System properties 1 Systems software 1 Theorie 1 Theory 1 Wahrscheinlichkeitsrechnung 1
more ... less ...
Online availability
All
Undetermined 2
Type of publication
All
Article 3
Type of publication (narrower categories)
All
Article in journal 1 Aufsatz in Zeitschrift 1 research-article 1
Language
All
English 3
Author
All
Bulusu, Pranahita 1 Buschle, Markus 1 El‐Attar, Mohamed 1 Franke, Ulrik 1 Haddad, Hisham 1 Johnson, Pontus 1 Shahriar, Hossain 1 Shahzad, Khurram 1 Ullberg, Johan 1
more ... less ...
Published in...
All
Business Process Management Journal 1 Information systems and e-business management : ISeB 1 International Journal of Secure Software Engineering (IJSSE) 1
Source
All
Other ZBW resources 2 ECONIS (ZBW) 1
Showing 1 - 3 of 3
Cover Image
LDAP Vulnerability Detection in Web Applications
Shahriar, Hossain; Haddad, Hisham; Bulusu, Pranahita - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 4, pp. 31-50
Lightweight Directory Access Protocol (LDAP) is commonly used in web applications to provide lookup information and enforcing authentication. Web applications may suffer from LDAP injection vulnerabilities that can lead to security breaches such as login bypass and privilege escalation. This...
Persistent link: https://www.econbiz.de/10012048090
Saved in:
Cover Image
An architecture modeling framework for probabilistic prediction
Johnson, Pontus; Ullberg, Johan; Buschle, Markus; … - In: Information systems and e-business management : ISeB 12 (2014) 4, pp. 595-622
Persistent link: https://www.econbiz.de/10010437038
Saved in:
Cover Image
A framework for improving quality in misuse case models
El‐Attar, Mohamed - In: Business Process Management Journal 18 (2012) 2, pp. 168-196
Purpose – Security is a vital requirement for software systems. Misuse case models allow system designers to inject security considerations within their designs early in the development cycle rather than patching an end system with security mechanisms after it was developed. The notation and...
Persistent link: https://www.econbiz.de/10014687928
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...