메뉴 건너뛰기




Volumn , Issue , 2005, Pages 41-49

Reasoning about confidentiality at requirements engineering time

Author keywords

Bounded model checking; Reasoning about confidentiality; Security requirements; Specification patterns

Indexed keywords

CODES (STANDARDS); COMPUTER PROGRAMMING; COMPUTER SOFTWARE; INFORMATION THEORY; MATHEMATICAL MODELS; SEMANTICS;

EID: 32344449269     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1081706.1081715     Document Type: Conference Paper
Times cited : (21)

References (31)
  • 3
    • 32344436131 scopus 로고    scopus 로고
    • http://www.cert.org/stats/cert_stats.html.
  • 4
    • 35248898859 scopus 로고    scopus 로고
    • Data access specification and the most powerful symbolic attacker in msr
    • LNCS 2609, Springer-Verlag, November
    • I. Cervesato, "Data access specification and the most powerful symbolic attacker in msr", In ISSS 2002: Software Security Theories and Systems, LNCS 2609, Springer-Verlag, November 2003, 384-416.
    • (2003) ISSS 2002: Software Security Theories and Systems , pp. 384-416
    • Cervesato, I.1
  • 8
    • 4544229064 scopus 로고    scopus 로고
    • Monotonicity and persistence in preferential logics
    • J. Engelfriet, "Monotonicity and persistence in preferential logics", J. Artif. Intell. Res. 8, 1998, 1-21.
    • (1998) J. Artif. Intell. Res. , vol.8 , pp. 1-21
    • Engelfriet, J.1
  • 10
    • 0040241328 scopus 로고
    • Towards a theory of knowledge and ignorance: Preliminary report
    • Springer-Verlag
    • J. Halpern and Y. Moses, "Towards a Theory of Knowledge and Ignorance: Preliminary Report", In Logics and Models of Concurrent Systems, Springer-Verlag, 1985, 459-476.
    • (1985) Logics and Models of Concurrent Systems , pp. 459-476
    • Halpern, J.1    Moses, Y.2
  • 14
    • 4544259747 scopus 로고    scopus 로고
    • A complete and decidable logic for resource bounded agents
    • New York, July
    • M. Jago, N. Alechina, and B. Logan, "A complete and decidable logic for resource bounded agents", Proc. AAMAS 04, New York, July 2004, 606-613.
    • (2004) Proc. AAMAS 04 , pp. 606-613
    • Jago, M.1    Alechina, N.2    Logan, B.3
  • 17
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen, "Three systems for cryptographic protocol analysis", Journal of Cryptology 7(2), 1994, 79-130.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 21
    • 35248827688 scopus 로고    scopus 로고
    • From system goals to software architecture
    • M. Bernardo & P. Inverardi (eds), LNCS 2804, Springer-Verlag
    • A. van Lamsweerde, "From System Goals to Software Architecture", In Formal Methods for Software Architectures, M. Bernardo & P. Inverardi (eds), LNCS 2804, Springer-Verlag, 2003, 25-43.
    • (2003) Formal Methods for Software Architectures , pp. 25-43
    • Van Lamsweerde, A.1
  • 28
    • 0012646053 scopus 로고    scopus 로고
    • Lecture Notes in Artificial Intelligence. Springer-Verlag, Berlin
    • Ch. Schulte. Programming Constraint Services. Lecture Notes in Artificial Intelligence Vol. 2302,. Springer-Verlag, Berlin, 2002.
    • (2002) Programming Constraint Services , vol.2302
    • Schulte, Ch.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.