• 1
    Jürjens J. Secure System Development with UML. Springer-Verlag: Berlin Heidelberg, 2005.
  • 2
    Kraemer FA, Herrmann P. Automated encapsulation of UML activities for incremental development and verification, International Conference on Model Driven Engineering, Languages and Systems (MoDELS), LNCS, Denver, CO, USA, Springer, 2009; 571585.
  • 3
    Kelly S, Tolvannen JP. Domain-Specific Modeling: Enabling Full Code Generation. John Wiley & Sons, Inc.: Hoboken, New Jersey, 2008.
  • 4
    The SecFutur project: design of secure and energy-efficient embedded systems for future Internet application., last visited May 2013.
  • 5
    Kraemer F. Engineering reactive systems: a compositional and model-driven method based on collaborative building blocks. Ph.D. Thesis, Norwegian University of Science and Technology, August 2008.
  • 6
    Kraemer FA, Slåtten V, Herrmann P. Tool support for the rapid composition, analysis and implementation of reactive services. Journal of Systems and Software 2009; 82(12): 20682080.
  • 7
    Kraemer FA. Engineering android applications based on UML activities, Model Driven Engineering Languages and Systems (MODELS), LNCS, Wellington, New Zealand, Springer Berlin / Heidelberg, 2011; 183–197.
  • 8
    Herzog A, Shahmehri N, Duma C. An ontology of information security. In Journal of Techniques and Applications for Advanced Information Privacy and Security. IGI Global: Hershey, Pennsylvania, USA, 2007; 123.
  • 9
    Vasilevskaya M, Gunawan LA, Nadjm-Tehrani S, Herrmann P. Security asset elicitation for collaborative models, Model-Driven Security Workshop (MDSec) in Conjunction with MoDELS, ACM Digital Library (DL), Innsbruck, Austria, 2012; 7–13.
  • 10
    MagicDraw., last visited May 2013.
  • 11
    HermiT Reasoner., last visited February 2013.
  • 12
    Acceleo., last visited February 2013.
  • 13
    ISO/IEC 12207:2008. Systems and software engineering – Software life cycle processes.
  • 14
    Object Management Group. UML Profile for MARTE: modeling and analysis of real-time embedded systems, version 1.1, June 2011. Document number: formal/2011-06-02.
  • 15
    Kraemer FA, Herrmann P. Reactive semantics for distributed UML activities. In Formal Techniques for Distributed Systems (FMOODS/FORTE), LNCS. Springer-Verlag: Berlin, Heidelberg, 2010; 1731.
  • 16
    Gunawan LA, Herrmann P, Kraemer FA. Towards the integration of security aspects into system development using collaboration-oriented models. In International Conference on Security Technology (SecTech), Ślȩzak D, hoon Kim T, Fang W, Arnett K (eds), Communications in Computer and Information Science. Springer: Berlin Heidelberg, 2009; 7285.
  • 17
    Gunawan LA, Kraemer FA, Herrmann P. A tool-supported method for the design and implementation of secure distributed applications. In Engineering Secure Software and Systems (ESSoS), LNCS. Springer-Verlag: Berlin, Heidelberg, 2011; 142155.
  • 18
    Gunawan LA, Herrmann P. Compositional verification of application-level security properties. In Engineering Secure Software and Systems (essos), LNCS. Springer–Verlag: Berlin Heidelberg, 2013; 7590.
  • 19
    Fenz S, Ekelhart A. Formalizing information security knowledge, ACM Symposium on Information, Computer and Communications Security (ASIACCS), ACM, 2009; 183194.
  • 20
    Object Management Group. Unified modeling language: superstructure, version 2.4.1, August 2011. Document number: formal/2011-08-06.
  • 21
    Iqbal MZ, Ali S, Yue T, Briand L. Experiences of applying uml/marte on three industrial projects, Model Driven Engineering Languages and Systems, (MoDELS), Innsbruck, Austria, Springer, 2012; 642–658.
  • 22
    Robert T, Perrier V. CoFluent methodology for UML. cofluent design, white paper 2010.
  • 23
    Petriu DC. Model Driven Engineering for Distributed Real-Time Systems: MARTE modelling, Model Transformations and Their Usages, chap. Software Model-based Performance Analysis. Wiley Online Library: London: ISTE, 2010.
  • 24
    Vasilevskaya M, Nadjm-Tehrani S. Support for cross-domain composition of embedded systems using MARTE models. Submitted 2013.
  • 25
    Selonen P. A review of UML model comparison approaches, Nordic Workshop on Model Driven Engineering, Ronneby, Sweden, 2007.
  • 26
    Bendix L, Emanuelsson P. Diff and merge support for model based development, Workshop on Comparison and Versioning of Software Models (CVSM), Leipzig, Germany, ACM, 2008; 31–34.
  • 27
    EMF Compare., last visited April 2013.
  • 28
    SiDiff., last visited May 2013.
  • 29
    Georg G, Anastasakis K, Bordbar B, Houmb S, Ray I, Toahchoodee M. Verification and Trade-Off Analysis of Security Properties in UML System Models. IEEE Press: USA, NJ, 2010.
  • 30
    OMAP3530., last visited Feburary 2013.
  • 31
    ADE7758: poly phase multifunction energy metering ic with per phase information., last visited Feburary 2013.
  • 32
    Braber F, Hogganvik I, Lund MS, Stølen K, Vraalsen F. Model-Based Security Analysis in Seven Steps – a Guided Tour to the CORAS Method. Springer-Verlag: Berlin and Heidelberg, 2007.
  • 33
    Ravi S, Raghunathan A, Chakradhar S. Tamper resistance mechanisms for secure embedded systems, International Conference on VLSI Design, Mumbai, India, IEEE, 2004; 605–611.
  • 34
    Ontology Language Manchester Syntax., last visited April 2013.
  • 35
    Cormen TH, Stein C, Rivest RL, Leiserson CE. Introduction to Algorithms, 2nd edn. The MIT Press and McGraw-Hill Book Company: Cambridge, MA, USA, 2001.
  • 36
    Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons: West Sussex, England, 2005.
  • 37
    Hamid B, Gürgens S, Jouvray C, Desnos N. Enforcing S&D pattern design in RCES with modeling and formal approaches, ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MoDELS), Wellington, New Zealand, 2011; 319333.
  • 38
    Georg G, Ray I, Anastasakis K, Bordbar B, Toahchoodee M, Houmb S. An aspect-oriented methodology for designing secure applications, 2009.
  • 39
    Lodderstedt T, Basin D, Doser J. SecureUML: a UML-based modeling language for model-driven security, International Conference on the Unified Modeling Language (UML), Dresden, Germany, 2002; 426–441.
  • 40
    Pedroza G, Apvrille L, Knorreck D. AVATAR: a SysML environment for the formal verification of safety and security properties, IEEE International Conference on New Technologies of Distributed Systems (NOTERE), 2011.
  • 41
    Ruiz JF, Harjani R, Mana A, Desnitsky V, Kotenko I, Chechulin A. A methodology for the analysis and modeling of security threats and attacks for systems of embedded components, Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Pisa, Italy, IEEE Computer Society, 2012; 261–268.
  • 42
    Hamid B, Desnos N, Grepet C, Jouvray C. Model-based security and dependability patterns in RCES – the TERESA approach, International Workshop on Security and Dependability for Resource Constrained Embedded Systems (S&D4RCES), Vienna, Austria, ACM, 2010.
  • 43
    Eby M, Werner J, Karsai G, Ledeczi A. Integrating security modeling into embedded system design, IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS), Tucson, Arizona, USA, 2007; 221–228.
  • 44
    Saadatmand M, Leveque T. Modeling security aspects in distributed real-time component-based embedded systems, International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, 2012; 43444.
  • 45
    Chandrasekaran B, Josephson JR, Benjamins VR. What are ontologies and why do we need them? In Intelligent Systems. IEEE: NJ, USA, 1999; 2026.
  • 46
    Gasevic D, Djuric D, Devedzic V. Model Driven Engineering and Ontology Development, 2nd edn. Springer-Verlag: Berlin Heidelberg, 2009.
  • 47
    Walter T, Parreiras FS, Staab S. An ontology-based framework for domain-specific modeling. Software & Systems Modeling 2012: 408422, DOI 10.1007/s10270-012-0249-9.
  • 48
    Clements P, Northrop L. Software Product Lines: Practices and Patterns, The SEI Series in Software Engineering. Addison–Wesley Longman Publishing Co., Inc.: Boston, MA, USA., 2001.
  • 49
    Urbani J, Maassen J, Drost N, Seinstra F, Bal H. Scalable RDF data compression with MapReduce. Concurrency and Computation: Practice and Experience 2013: 24–39, DOI: 10.1002/cpe.2840.