메뉴 건너뛰기




Volumn 3477, Issue , 2005, Pages 161-176

Modeling social and individual trust in requirements engineering methodologies

Author keywords

Agent Oriented Technologies; Information Technologies; Realization of prototypes; Requirements and methodologies; Security Trust; Social; Trust specification, analysis and reasoning

Indexed keywords

AGENTS; DATA ACQUISITION; SECURITY OF DATA; SECURITY SYSTEMS; SOCIAL ASPECTS;

EID: 24944578244     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11429760_12     Document Type: Conference Paper
Times cited : (33)

References (19)
  • 2
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for MAS: Cognitive anatomy, social importance and quantification
    • IEEE Press
    • C. Castelfranchi and R. Falcone. Principles of trust for MAS: Cognitive anatomy, social importance and quantification. In Proc. of ICMAS'98, pages 72-79. IEEE Press, 1998.
    • (1998) Proc. of ICMAS'98 , pp. 72-79
    • Castelfranchi, C.1    Falcone, R.2
  • 5
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management: Model, methodology, and reasoning
    • Springer-Verlag
    • P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning. In Proc. of iTrust'04, LNCS 2995, pages 176-190. Springer-Verlag, 2004.
    • (2004) Proc. of ITrust'04, LNCS , vol.2995 , pp. 176-190
    • Giorgini, P.1    Massacci, F.2    Mylopoulous, J.3    Zannone, N.4
  • 6
    • 4544372344 scopus 로고    scopus 로고
    • Monitoring and organizational-level adaptation of multi-agent systems
    • ACM Press
    • Z. Guessoum, M. Ziane, and N. Faci. Monitoring and Organizational-Level Adaptation of Multi-Agent Systems. In Proc. of AAMAS'04, pages 514-521. ACM Press, 2004.
    • (2004) Proc. of AAMAS'04 , pp. 514-521
    • Guessoum, Z.1    Ziane, M.2    Faci, N.3
  • 7
    • 22444452622 scopus 로고    scopus 로고
    • Dependence relations between roles in a multi-agent system: Towards the detection of inconsistencies in organization
    • Springer-Verlag
    • M. Hannoun, J. S. Sichman, O. Boissier, and C. Sayettat. Dependence Relations between Roles in a Multi-Agent System: Towards the Detection of Inconsistencies in Organization. In Proc. of 1st. Int. Workshop on Multi-Agent Based Simulation, LNCS 1534, pages 169-182. Springer-Verlag, 1998.
    • (1998) Proc. of 1st. Int. Workshop on Multi-Agent Based Simulation, LNCS , vol.1534 , pp. 169-182
    • Hannoun, M.1    Sichman, J.S.2    Boissier, O.3    Sayettat, C.4
  • 9
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. TODS, 26(2):214-260, 2001.
    • (2001) TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.L.3    Subrahmanian, V.S.4
  • 11
    • 0242584074 scopus 로고    scopus 로고
    • Monitoring teams by overhearing: A multi-agent plan-recognition approach
    • G. A. Kaminka, D. V. Pynadath, and M. Tambe. Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach. JAIR, 17:83-135, 2002.
    • (2002) JAIR , vol.17 , pp. 83-135
    • Kaminka, G.A.1    Pynadath, D.V.2    Tambe, M.3
  • 12
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Springer-Verlag
    • T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In Proc. of UML'02, LNCS 2460, pages 426-441. Springer-Verlag, 2002.
    • (2002) Proc. of UML'02, LNCS , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 13
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the italian data protection Legislation
    • To Appear. An extended version is available as Technical report DIT-04-103 at eprints.biblio.unitn.it
    • F. Massacci, M. Prest, and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation. Comp. Standards & Interfaces, 2005. To Appear. An extended version is available as Technical report DIT-04-103 at eprints.biblio.unitn.it.
    • (2005) Comp. Standards & Interfaces
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 14
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • IEEE Press
    • J. McDermott and C. Fox. Using Abuse Case Models for Security Requirements Analysis. In Proc. of ACSAC'99, pages 55-66. IEEE Press, 1999.
    • (1999) Proc. of ACSAC'99 , pp. 55-66
    • McDermott, J.1    Fox, C.2
  • 16
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • ACM Press
    • I. Ray, N. Li, R. France, and D.-K. Kim. Using UML to visualize role-based access control constraints. In Proc. of SACMAT'04, pages 115-124. ACM Press, 2004.
    • (2004) Proc. of SACMAT'04 , pp. 115-124
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.-K.4
  • 17
    • 78649292460 scopus 로고    scopus 로고
    • On personal and role mental attitudes: A preliminary dependence-based analysis
    • Springer-Verlag
    • J. S. Sichman and R. Conte. On personal and role mental attitudes: A preliminary dependence-based analysis. In Proc. of SBIA '98, LNCS 1515, pages 1-10. Springer-Verlag, 1998.
    • (1998) Proc. of SBIA '98, LNCS , vol.1515 , pp. 1-10
    • Sichman, J.S.1    Conte, R.2
  • 18
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting security requirements by misuse cases
    • IEEE Press
    • G. Sindre and A. L. Opdahl. Eliciting Security Requirements by Misuse Cases. In Proc. of TOOLS Pacific 2000, pages 120 -131. IEEE Press, 2000.
    • (2000) Proc. of TOOLS Pacific 2000 , pp. 120-131
    • Sindre, G.1    Opdahl, A.L.2
  • 19
    • 17744386105 scopus 로고    scopus 로고
    • From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens. From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In Proc. of RHAS'03, pages 49-56, 2003.
    • (2003) Proc. of RHAS'03 , pp. 49-56
    • Van Lamsweerde, A.1    Brohez, S.2    De Landtsheer, R.3    Janssens, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.