메뉴 건너뛰기




Volumn 4001 LNCS, Issue , 2006, Pages 33-47

Designing security requirements models through planning

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; COMPUTER ARCHITECTURE; FORMAL LOGIC; MATHEMATICAL MODELS; SOFTWARE AGENTS; SOFTWARE ENGINEERING; STRATEGIC PLANNING;

EID: 33746068596     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11767138_4     Document Type: Conference Paper
Times cited : (29)

References (36)
  • 2
    • 0031074857 scopus 로고    scopus 로고
    • Fast planning through planning graph analysis
    • A. Blum and M. L. Furst. Fast Planning Through Planning Graph Analysis. Artif. Intell., 90(1-2):281-300, 1997.
    • (1997) Artif. Intell. , vol.90 , Issue.1-2 , pp. 281-300
    • Blum, A.1    Furst, M.L.2
  • 3
    • 33746035716 scopus 로고    scopus 로고
    • Requirements analysis for socio-technical systems: Exploring and evaluating alternatives
    • Submitted to
    • V. Bryl, P. Giorgini, and J. Mylopoulos. Requirements Analysis for Socio-technical Systems: Exploring and Evaluating Alternatives, 2006. Submitted to RE'06.
    • (2006) RE'06
    • Bryl, V.1    Giorgini, P.2    Mylopoulos, J.3
  • 4
    • 33746077132 scopus 로고    scopus 로고
    • Designing security requirements models through planning
    • University of Trento
    • V. Bryl, F. Massacci, J. Mylopoulos, and N. Zannone. Designing Security Requirements Models through Planning. Technical Report DIT-06-003, University of Trento, 2006.
    • (2006) Technical Report , vol.DIT-06-003
    • Bryl, V.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 5
    • 0031353036 scopus 로고    scopus 로고
    • Moving proofs-as-programs into practice
    • IEEE Press
    • J. Caldwell. Moving Proofs-as-Programs into Practice. In Proc. of ASE'97, pages 10-17. IEEE Press, 1997.
    • (1997) Proc. of ASE'97 , pp. 10-17
    • Caldwell, J.1
  • 7
    • 0036721855 scopus 로고    scopus 로고
    • Towards requirements-driven information systems engineering: The tropos project
    • J. Castro, M. Kolp, and J. Mylopoulos. Towards Requirements-Driven Information Systems Engineering: The Tropos Project. Inform. Sys., 27(6):365-389, 2002.
    • (2002) Inform. Sys. , vol.27 , Issue.6 , pp. 365-389
    • Castro, J.1    Kolp, M.2    Mylopoulos, J.3
  • 8
    • 0342520920 scopus 로고    scopus 로고
    • ConGolog, a concurrent programming language based on the situation calculus
    • G. de Giacomo, Y. Lespérance, and H. J. Levesque. ConGolog, a concurrent programming language based on the situation calculus. Artif. Intell., 121(1-2):109-169, 2000.
    • (2000) Artif. Intell. , vol.121 , Issue.1-2 , pp. 109-169
    • De Giacomo, G.1    Lespérance, Y.2    Levesque, H.J.3
  • 10
    • 25144522234 scopus 로고    scopus 로고
    • Pddl2.2: The language for the classical part of the 4th international planning competition
    • University of Freiburg
    • S. Edelkamp and J. Hoffmann. Pddl2.2: The language for the classical part of the 4th international planning competition. Technical Report 195, University of Freiburg, 2004.
    • (2004) Technical Report , vol.195
    • Edelkamp, S.1    Hoffmann, J.2
  • 11
    • 84941146970 scopus 로고    scopus 로고
    • Specification and synthesis of hybrid automata for physics-based animation
    • T. Ellman. Specification and Synthesis of Hybrid Automata for Physics-Based Animation. In Proc. of ASE'03, pages 80-93, 2003.
    • (2003) Proc. of ASE'03 , pp. 80-93
    • Ellman, T.1
  • 12
    • 0035643160 scopus 로고    scopus 로고
    • Striking a balance between trust and control in a virtual organization: A content analysis of open source software case studies
    • M. J. Gallivan. Striking a balance between trust and control in a virtual organization: a content analysis of open source software case studies. ISJ, 11(2):277, 2001.
    • (2001) ISJ , vol.11 , Issue.2 , pp. 277
    • Gallivan, M.J.1
  • 14
    • 27644432492 scopus 로고    scopus 로고
    • Modeling the impact of trust and distrust in agent networks
    • G. Gans, M. Jarke, S. Kethers, and G. Lakemeyer. Modeling the Impact of Trust and Distrust in Agent Networks. In Proc. of AOIS'01, pages 45-58, 2001.
    • (2001) Proc. of AOIS'01 , pp. 45-58
    • Gans, G.1    Jarke, M.2    Kethers, S.3    Lakemeyer, G.4
  • 16
    • 27644537252 scopus 로고    scopus 로고
    • Modeling security requirements through ownership, permission and delegation
    • IEEE Press
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176. IEEE Press, 2005.
    • (2005) Proc. of RE'05 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 17
    • 24944578244 scopus 로고    scopus 로고
    • Modelling social and individual trust in requirements engineering methodologies
    • Springer-Verlag
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modelling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05, LNCS 3477, pages 161-176. Springer-Verlag, 2005.
    • (2005) Proc. of ITrust'05, LNCS , vol.3477 , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 19
    • 0002303187 scopus 로고
    • Planning as satisfiability
    • John Wiley & Sons, Inc.
    • H. Kautz and B. Selman. Planning as satisfiability. In Proc. of ECAI'92, pages 359-363. John Wiley & Sons, Inc., 1992.
    • (1992) Proc. of ECAI'92 , pp. 359-363
    • Kautz, H.1    Selman, B.2
  • 20
    • 20344363679 scopus 로고    scopus 로고
    • Reasoning about partial goal satisfaction for requirements and design engineering
    • E. Letier and A. van Lamsweerde. Reasoning about partial goal satisfaction for requirements and design engineering. ACM SIGSOFT Software Eng. Notes, 29(6):53-62, 2004.
    • (2004) ACM SIGSOFT Software Eng. Notes , vol.29 , Issue.6 , pp. 53-62
    • Letier, E.1    Van Lamsweerde, A.2
  • 22
    • 84976781844 scopus 로고
    • A deductive approach to program synthesis
    • Z. Manna and R. Waldinger. A Deductive Approach to Program Synthesis. TOPLAS, 2(1):90-121, 1980.
    • (1980) TOPLAS , vol.2 , Issue.1 , pp. 90-121
    • Manna, Z.1    Waldinger, R.2
  • 23
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • F. Massacci, M. Prest, and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation. Comp. Standards & Interfaces, 27(5):445-455, 2005.
    • (2005) Comp. Standards & Interfaces , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 24
    • 33746078483 scopus 로고    scopus 로고
    • Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the Allied Irish bank
    • University of Trento
    • F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. Technical Report DIT-06-002, University of Trento, 2006.
    • (2006) Technical Report , vol.DIT-06-002
    • Massacci, F.1    Zannone, N.2
  • 25
    • 0347269217 scopus 로고    scopus 로고
    • Strategies of structural synthesis of programs and its extensions
    • M. Matskin and E. Tyugu. Strategies of Structural Synthesis of Programs and Its Extensions. Comp. and Informatics, 20:1-25, 2001.
    • (2001) Comp. and Informatics , vol.20 , pp. 1-25
    • Matskin, M.1    Tyugu, E.2
  • 26
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • IEEE Press
    • J. McDermott and C. Fox. Using Abuse Case Models for Security Requirements Analysis. In Proc. of ACSAC'99, pages 55-66. IEEE Press, 1999.
    • (1999) Proc. of ACSAC'99 , pp. 55-66
    • McDermott, J.1    Fox, C.2
  • 27
    • 0003586779 scopus 로고    scopus 로고
    • July
    • Object Management Group. Model Driven Architecture (MDA). http://www.omg.org/docs/ormsc/01-07-01.pdf, July 2001.
    • (2001) Model Driven Architecture (MDA)
  • 28
    • 33745757810 scopus 로고    scopus 로고
    • Web service composition as AI planning - A survey
    • University of St. Gallen
    • J. Peer. Web Service Composition as AI Planning - a Survey. Technical report, University of St. Gallen, 2005.
    • (2005) Technical Report
    • Peer, J.1
  • 29
    • 23744501343 scopus 로고    scopus 로고
    • Automated procedure construction for deductive synthesis
    • S. Roach and J. Baalen. Automated Procedure Construction for Deductive Synthesis. ASE, 12(4):393-414, 2005.
    • (2005) ASE , vol.12 , Issue.4 , pp. 393-414
    • Roach, S.1    Baalen, J.2
  • 30
    • 33746042607 scopus 로고    scopus 로고
    • What is model driven architecture?
    • Department of Informatics, University of Oslo, March
    • R. K. Runde and K. Stølen. What is model driven architecture? Technical Report UIO-IFI-RR304, Department of Informatics, University of Oslo, March 2003.
    • (2003) Technical Report , vol.UIO-IFI-RR304
    • Runde, R.K.1    Stølen, K.2
  • 32
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. Requirements Eng. J., 10(1):34-44, 2005.
    • (2005) Requirements Eng. J. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 33
    • 17744386105 scopus 로고    scopus 로고
    • From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens. From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In Proc. of RHAS'03, pages 49-56, 2003.
    • (2003) Proc. of RHAS'03 , pp. 49-56
    • Van Lamsweerde, A.1    Brohez, S.2    De Landtsheer, R.3    Janssens, D.4
  • 34
    • 0032633177 scopus 로고    scopus 로고
    • Recent advances in AI planning
    • D. S. Weld. Recent Advances in AI Planning. AI Magazine, 20(2):93-123, 1999.
    • (1999) AI Magazine , vol.20 , Issue.2 , pp. 93-123
    • Weld, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.