REFERENCES
Basin, D., Clavel, M., and Egea, M. (2010). Automatic
Generation of Smart, Security-Aware GUI Models.
In Engineering Secure Software and Systems, volume
5965 of Lecture Notes in Computer Science, pages
201–217. Springer.
Basin, D., Clavel, M., Egea, M., Garc
´
ıa de Dios, M. A.,
Dania, C., Ortiz, G., and Valdazo, J. (2011). Model-
Driven Development of Security-Aware GUIs for
Data-Centric Applications. In Aldini, A. and Gorri-
eri, R., editors, Foundations of Security Analysis and
Design VI, volume 6858 of Lecture Notes in Computer
Science, pages 101–124. Springer Berlin Heidelberg.
Becker, P., Papa, F., and Olsina, L. (2013). Enhancing the
Conceptual Framework Capability for a Measurement
and Evaluation Strategy. 4th International Workshop
on Quality in Web Engineering , 6360:1–12.
Beckers, K., Eicker, S., Heisel, M., and (UDE),
W. S. (2012). NESSoS Deliverable D5.2 –
Identification of Research Gaps in the Com-
mon Body of Knowledge. http://www.nessos-
project.eu/media/deliverables/y2/NESSoS-D5.2.pdf.
Bertolino, A., Busch, M., Daoudagh, S., Koch, N., Lonetti,
F., and Marchetti, E. (2013). A Toolchain for Design-
ing and Testing XACML Policies. In Proceedings of
ICST 2013.
Brambilla, M. and Fraternali, P. (2013). Large-scale Model-
Driven Engineering of web user interaction: The
WebML and WebRatio experience. Science of Com-
puter Programming.
Busch, M. (2011). Integration of Security As-
pects in Web Engineering. Master’s the-
sis, Ludwig-Maximilians-Universit
¨
at M
¨
unchen.
http://uwe.pst.ifi.lmu.de/publications/BuschDA.pdf.
Busch, M. (2013). SecEval – Information and Figures.
http://www.pst.ifi.lmu.de/ busch/SecEval/.
Busch, M. and Garc
´
ıa de D
´
ıos, M. A. (2012). Ac-
tionUWE: Transformation of UWE to ActionGUI
Models. Technical report, Ludwig-Maximilians-
Universit
¨
at M
¨
unchen. Number of Report: 1203.
Busch, M., Knapp, A., and Koch, N. (2011). Modeling Se-
cure Navigation in Web Information Systems. In Gra-
bis, J. and Kirikova, M., editors, 10th International
Conference on Business Perspectives in Informatics
Research, LNBIP, pages 239–253. Springer Verlag.
Busch, M. and Koch, N. (2011). NESSoS De-
liverable D2.1 – First release of Method
and Tool Evaluation. http://www.nessos-
project.eu/media/deliverables/y1/NESSoS-D2.1.pdf.
Busch, M. and Koch, N. (2013). NESSoS Deliverable D2.4
– Second Release of the Method and Tool Evaluation.
to appear.
Busch, M., Koch, N., Masi, M., Pugliese, R., and Tiezzi,
F. (2012). Towards model-driven development of ac-
cess control policies for web applications. In Model-
Driven Security Workshop in conjunction with MoD-
ELS 2012. ACM Digital Library.
Busch, M., Koch, N., and Wirsing, M. (2014). SecEval: An
Evaluation Framework for Engineering Secure Sys-
tems. submitted.
Busch, M., Ochoa, M., and Schwienbacher, R. (2013).
Modeling, Enforcing and Testing Secure Navigation
Paths for Web Applications. Technical Report 1301,
Ludwig-Maximilians-Universit
¨
at M
¨
unchen.
Elahi, G., Yu, E., and Zannone, N. (2010). A vulnerability-
centric requirements engineering framework: analyz-
ing security attacks, countermeasures, and require-
ments based on vulnerabilities. Requirements Engi-
neering, 15(1):41–62.
Gilmore, S., G
¨
onczy, L., Koch, N., Mayer, P., Tribas-
tone, M., and Varr
´
o, D. (2011). Non-functional Prop-
erties in the Model-Driven Development of Service-
Oriented Systems. SOSYM, 10(3):287–311.
Hafner, M. and Breu, R. (2008). Security Engineering for
Service-Oriented Architectures. Springer.
IFML (2013). Interaction Flow Modeling Lan-
guage (IFML), FTF – Beta 1. OMG standard.
http://www.omg.org/spec/IFML/.
J
¨
urjens, J. (2004). Secure Systems Development with
UML. Springer. Tools and further information:
http://www.umlsec.de/.
Kitchenham, B. and Charters, S. (2007). Guidelines for
performing Systematic Literature Reviews in Soft-
ware Engineering. Technical Report EBSE 2007-001,
Keele University and Durham University Joint Report.
Koch, N., Knapp, A., Zhang, G., and Baumeister, H. (2008).
UML-based Web Engineering: An Approach based on
Standards. In Web Engineering: Modelling and Imple-
menting Web Applications, Human-Computer Interac-
tion Series, pages 157–191. Springer.
LMU (2013). UWE – UML-based Web Engineering Home-
page. http://uwe.pst.ifi.lmu.de/.
Lodderstedt, T., Basin, D., and Doser, J. (2002). Se-
cureUML: A UML-Based Modeling Language for
Model-Driven Security. In Proc. 5th Int. Conf. Uni-
fied Modeling Language (UML’02), volume 2460 of
Lecture Notes in Computer Science, pages 426–441.
Springer.
Meli
´
a, S., G
´
omez, J., P
´
erez, S., and D
´
ıaz, O. (2008). A
Model-Driven Development for GWT-Based Rich In-
ternet Applications with OOH4RIA. In ICWE’08,
pages 13–23. IEEE.
Menzel, M. and Meinel, C. (2009). A Security Meta-model
for Service-Oriented Architectures. In Proc. 2009
IEEE Int. Conf. Services Computing (SCC’09), pages
251–259. IEEE.
Moody, D. L. (2003). The Method Evaluation Model:
a Theoretical Model for Validating Information Sys-
tems Design Methods. In Ciborra, C. U., Mercurio,
R., de Marco, M., Martinez, M., and Carignani, A.,
editors, ECIS, pages 1327–1336.
Rzehaczek, K. (2013). Transformation of graphical UWE
models to a textual DSL. Bachelor Thesis.
Slimani, N., Khambhammettu, H., Adi, K., and Logrippo,
L. (2011). UACML: Unified Access Control Model-
ing Language. In NTMS 2011, pages 1–8.
Valverde, F. and Pastor, O. (2008). Applying Interac-
tion Patterns: Towards a Model-Driven Approach for
MODELSWARD2014-DoctoralConsortium
10