-
1
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, and A. Perini. TROPOS: An Agent-Oriented Software Development Methodology. JAAMAS, 8(3):203-236, 2004.
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
2
-
-
85041439566
-
Principles of trust for MAS: Cognitive anatomy, social importance and quantification
-
IEEE Press
-
C. Castelfranchi and R. Falcone. Principles of trust for MAS: Cognitive anatomy, social importance and quantification. In Proc. of ICMAS'98, pages 72-79. IEEE Press, 1998.
-
(1998)
Proc. of ICMAS'98
, pp. 72-79
-
-
Castelfranchi, C.1
Falcone, R.2
-
3
-
-
85189788266
-
The CORAS methodology: Model-based risk assessment using UML and UP
-
Idea Group Publishing
-
F. den Braber, T. Dimitrakos, B. A. Gran, M. S. Lund, K. Stølen, and J. Ø. Aagedal. The CORAS methodology: model-based risk assessment using UML and UP. In UML and the unified process, pages 332-357. Idea Group Publishing, 2003.
-
(2003)
UML and the Unified Process
, pp. 332-357
-
-
Den Braber, F.1
Dimitrakos, T.2
Gran, B.A.3
Lund, M.S.4
Stølen, K.5
Aagedal, J.Ø.6
-
4
-
-
20444505719
-
MAC and UML for secure software design
-
ACM Press
-
T. Doan, S. Demurjian, T. C. Ting, and A. Ketterl. MAC and UML for secure software design. In Proc. of FMSE'04, pages 75-85. ACM Press, 2004.
-
(2004)
Proc. of FMSE'04
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
5
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
Springer-Verlag
-
P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning. In Proc. of iTrust'04, LNCS 2995, pages 176-190. Springer-Verlag, 2004.
-
(2004)
Proc. of ITrust'04, LNCS
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulous, J.3
Zannone, N.4
-
6
-
-
4544372344
-
Monitoring and organizational-level adaptation of multi-agent systems
-
ACM Press
-
Z. Guessoum, M. Ziane, and N. Faci. Monitoring and Organizational-Level Adaptation of Multi-Agent Systems. In Proc. of AAMAS'04, pages 514-521. ACM Press, 2004.
-
(2004)
Proc. of AAMAS'04
, pp. 514-521
-
-
Guessoum, Z.1
Ziane, M.2
Faci, N.3
-
7
-
-
22444452622
-
Dependence relations between roles in a multi-agent system: Towards the detection of inconsistencies in organization
-
Springer-Verlag
-
M. Hannoun, J. S. Sichman, O. Boissier, and C. Sayettat. Dependence Relations between Roles in a Multi-Agent System: Towards the Detection of Inconsistencies in Organization. In Proc. of 1st. Int. Workshop on Multi-Agent Based Simulation, LNCS 1534, pages 169-182. Springer-Verlag, 1998.
-
(1998)
Proc. of 1st. Int. Workshop on Multi-Agent Based Simulation, LNCS
, vol.1534
, pp. 169-182
-
-
Hannoun, M.1
Sichman, J.S.2
Boissier, O.3
Sayettat, C.4
-
9
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. TODS, 26(2):214-260, 2001.
-
(2001)
TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
11
-
-
0242584074
-
Monitoring teams by overhearing: A multi-agent plan-recognition approach
-
G. A. Kaminka, D. V. Pynadath, and M. Tambe. Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach. JAIR, 17:83-135, 2002.
-
(2002)
JAIR
, vol.17
, pp. 83-135
-
-
Kaminka, G.A.1
Pynadath, D.V.2
Tambe, M.3
-
12
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Springer-Verlag
-
T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In Proc. of UML'02, LNCS 2460, pages 426-441. Springer-Verlag, 2002.
-
(2002)
Proc. of UML'02, LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
13
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the italian data protection Legislation
-
To Appear. An extended version is available as Technical report DIT-04-103 at eprints.biblio.unitn.it
-
F. Massacci, M. Prest, and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation. Comp. Standards & Interfaces, 2005. To Appear. An extended version is available as Technical report DIT-04-103 at eprints.biblio.unitn.it.
-
(2005)
Comp. Standards & Interfaces
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
14
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
IEEE Press
-
J. McDermott and C. Fox. Using Abuse Case Models for Security Requirements Analysis. In Proc. of ACSAC'99, pages 55-66. IEEE Press, 1999.
-
(1999)
Proc. of ACSAC'99
, pp. 55-66
-
-
McDermott, J.1
Fox, C.2
-
16
-
-
4143147399
-
Using UML to visualize role-based access control constraints
-
ACM Press
-
I. Ray, N. Li, R. France, and D.-K. Kim. Using UML to visualize role-based access control constraints. In Proc. of SACMAT'04, pages 115-124. ACM Press, 2004.
-
(2004)
Proc. of SACMAT'04
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.-K.4
-
17
-
-
78649292460
-
On personal and role mental attitudes: A preliminary dependence-based analysis
-
Springer-Verlag
-
J. S. Sichman and R. Conte. On personal and role mental attitudes: A preliminary dependence-based analysis. In Proc. of SBIA '98, LNCS 1515, pages 1-10. Springer-Verlag, 1998.
-
(1998)
Proc. of SBIA '98, LNCS
, vol.1515
, pp. 1-10
-
-
Sichman, J.S.1
Conte, R.2
-
18
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
IEEE Press
-
G. Sindre and A. L. Opdahl. Eliciting Security Requirements by Misuse Cases. In Proc. of TOOLS Pacific 2000, pages 120 -131. IEEE Press, 2000.
-
(2000)
Proc. of TOOLS Pacific 2000
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
19
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens. From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In Proc. of RHAS'03, pages 49-56, 2003.
-
(2003)
Proc. of RHAS'03
, pp. 49-56
-
-
Van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
|