2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST) 2015
DOI: 10.1109/icst.2015.7102633
|View full text |Cite
|
Sign up to set email alerts
|

TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…As mentioned earlier, we successfully defined UML models with OCL descriptions for various security design patterns [7]. In the future, we have a plan to prepare a guideline of describing OCL descriptions for security patterns based on our experience.…”
Section: Limitationsmentioning
confidence: 97%
See 3 more Smart Citations
“…As mentioned earlier, we successfully defined UML models with OCL descriptions for various security design patterns [7]. In the future, we have a plan to prepare a guideline of describing OCL descriptions for security patterns based on our experience.…”
Section: Limitationsmentioning
confidence: 97%
“…OCL [5,6] stands for Object Constraint Language, which is a semiformal language that is used to express constraints and other expressions in UML and other modeling languages. For example, in [7], we successfully defined UML models with OCL descriptions for various security design patterns.…”
Section: Security Design Patternsmentioning
confidence: 99%
See 2 more Smart Citations
“…Because the majority of reports create a unique tool, there are many tools for modeling, analysis, design, and implementation. However, few studies propose testing tools (such as model-based testing [179,209]) and operating tools (such a runtime framework [40,171,173,199]).…”
Section: Tool and Automationmentioning
confidence: 99%