메뉴 건너뛰기




Volumn 5, Issue 4, 2006, Pages 257-274

Requirements engineering for trust management: Model, methodology, and reasoning

Author keywords

Agent oriented software; Privilege management; Requirements Engineering; Security Engineering; Trust models for business and organizations; Verification and validation of software

Indexed keywords


EID: 33749035450     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-006-0005-7     Document Type: Article
Times cited : (76)

References (42)
  • 3
    • 0029697680 scopus 로고    scopus 로고
    • A security policy model for clinical information systems
    • In: IEEE Press
    • Anderson, R. A security policy model for clinical information systems. In: Proceedings of Symposium on Security and Privacy, pp. 30-43. IEEE Press (1996)
    • (1996) Proceedings of Symposium on Security and Privacy , pp. 30-43
    • Anderson, R.1
  • 4
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing Web site privacy vulnerabilities
    • Antón AI., Earp JB. (2004) A requirements taxonomy for reducing Web site privacy vulnerabilities. Requirements Eng. J. 9(3): 169-185
    • (2004) Requirements Eng. J. , vol.9 , Issue.3 , pp. 169-185
    • Antón, A.I.1    Earp, J.B.2
  • 6
    • 0040704448 scopus 로고
    • Managing the paradox of organizational trust
    • Barnes LB. (1981) Managing the paradox of organizational trust. Harvard Bus. Rev. 59(2): 107-116
    • (1981) Harvard Bus. Rev. , vol.59 , Issue.2 , pp. 107-116
    • Barnes, L.B.1
  • 7
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin D., Doser J., Lodderstedt T. (2006) Model driven security: From UML models to access control infrastructures. TOSEM 15(1): 39-91
    • (2006) TOSEM , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 11
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for MAS: Cognitive anatomy, social importance and quantification
    • In: IEEE Press
    • Castelfranchi, C., Falcone, R. Principles of trust for MAS: Cognitive anatomy, social importance and quantification. In: Proceedings of ICMAS'98, pp. 72-79. IEEE Press (1998)
    • (1998) Proceedings of ICMAS'98 , pp. 72-79
    • Castelfranchi, C.1    Falcone, R.2
  • 13
    • 0029191009 scopus 로고
    • Dealing with non-functional requirements: Three experimental studies of a process-oriented approach
    • In: ACM Press
    • Chung, L., Nixon, B. Dealing with non-functional requirements: Three experimental studies of a process-oriented approach. In: Proceedings of ICSE'95, pp. 25-37. ACM Press (1995)
    • (1995) Proceedings of ICSE'95 , pp. 25-37
    • Chung, L.1    Nixon, B.2
  • 14
    • 0141804971 scopus 로고    scopus 로고
    • A policy framework for management of distributed systems
    • Ph.D. Thesis, University of London
    • Damianou, N. A policy framework for management of distributed systems. Ph.D. Thesis, University of London (2002)
    • (2002)
    • Damianou, N.1
  • 16
    • 27644590666 scopus 로고    scopus 로고
    • Requirements BEFORE the requirements: Understanding the upstream Impacts
    • In: IEEE Press
    • Ebert, C. Requirements BEFORE the requirements: Understanding the upstream Impacts. In: Proceedings of RE'05, pp. 117-124. IEEE Press (2005)
    • (2005) Proceedings of RE'05 , pp. 117-124
    • Ebert, C.1
  • 18
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
    • In: LNCS Springer, Berlin Heidelberg Newyork
    • Giorgini, P., Massacci, F., Mylopoulos, J. Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In: Proceedings of ER'03, LNCS 2813, pp. 263-276. Springer, Berlin Heidelberg Newyork (2003)
    • (2003) Proceedings of ER'03 , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 19
    • 35048857793 scopus 로고    scopus 로고
    • Filling the gap between requirements engineering and public key/trust management infrastructures
    • In: LNCS Springer, Berlin Heidelberg Newyork
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N. Filling the gap between requirements engineering and public key/trust management infrastructures. In: Proceedings of EuroPKI'04, LNCS 3093, pp. 98-111. Springer, Berlin Heidelberg Newyork (2004)
    • (2004) Proceedings of EuroPKI'04 , vol.3093 , pp. 98-111
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 20
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management: Model, methodology, and reasoning
    • In: LNCS Springer, Berlin Heidelberg Newyork
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering meets trust management: Model, methodology, and reasoning. In: Proceedings of iTrust'04, LNCS 2995, pp. 176-190. Springer, Berlin Heidelberg Newyork (2004)
    • (2004) Proceedings of ITrust'04 , vol.2995 , pp. 176-190
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 21
    • 27644537252 scopus 로고    scopus 로고
    • Modeling security requirements through ownership, permission and delegation
    • In: IEEE Press
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N. Modeling security requirements through ownership, permission and delegation. In: Proceedings of RE'05, pp. 167-176. IEEE Press (2005)
    • (2005) Proceedings of RE'05 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 22
    • 24944578244 scopus 로고    scopus 로고
    • Modelling social and individual trust in requirements engineering methodologies
    • In: LNCS Springer, Berlin Heidelberg Newyork
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N. Modelling social and individual trust in requirements engineering methodologies. In: Proceedings of iTrust'05, LNCS 3477, pp. 161-176. Springer, Berlin Heidelberg Newyork (2005)
    • (2005) Proceedings of ITrust'05 , vol.3477 , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 23
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • In: IEEE Press
    • Jim, T. SD3: A trust management system with certified evaluation. In: Proceedings of Symposium on Security and Privacy, pp. 106-115. IEEE Press (2001)
    • (2001) Proceedings of Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 24
    • 84891477511 scopus 로고    scopus 로고
    • Secure Systems Development with UML
    • Springer
    • Jürjens, J. Secure Systems Development with UML. Springer, (2004)
    • (2004)
    • Jürjens, J.1
  • 26
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • Li N., Grosof B.N., Feigenbaum J. (2003) Delegation logic: A logic-based approach to distributed authorization. TISSEC 6(1): 128-171
    • (2003) TISSEC , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 28
    • 84942866002 scopus 로고    scopus 로고
    • Security and Privacy Requirements Analysis within a Social Setting
    • In: IEEE Press
    • Liu, L., Yu, E.S.K., Mylopoulos, J. Security and Privacy Requirements Analysis within a Social Setting. In: Proceedings of RE'03, pp. 151-161. IEEE Press (2003)
    • (2003) Proceedings of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 29
    • 34249110788 scopus 로고    scopus 로고
    • From hippocratic databases to secure tropos: A computer-aided re- engineering Approach
    • (in press)
    • Massacci, F., Mylopoulos, J., Zannone, N. From hippocratic databases to secure tropos: A computer-aided re- engineering Approach. IJSEKE (2006). (in press).
    • (2006) IJSEKE
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 31
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation
    • Massacci F., Prest M., Zannone N. (2005) Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation. Comp. Stand. Inter. 27(5): 445-455
    • (2005) Comp. Stand. Inter. , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 32
    • 33746078483 scopus 로고    scopus 로고
    • Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the allied irish bank
    • Tech. Rep. DIT-06-002, University of Trento
    • Massacci, F., Zannone, N. Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the allied irish bank. Tech. Rep. DIT-06-002, University of Trento (2006)
    • (2006)
    • Massacci, F.1    Zannone, N.2
  • 33
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements Analysis
    • In: IEEE Press
    • McDermott, J., Fox, C. Using abuse case models for security requirements Analysis. In: Proceedings of ACSAC'99, pp. 55-66. IEEE Press (1999)
    • (1999) Proceedings of ACSAC'99 , pp. 55-66
    • McDermott, J.1    Fox, C.2
  • 34
    • 0141862713 scopus 로고    scopus 로고
    • The meanings of trust
    • Tech. Rep. 96-04, MIS Research Center
    • McKnight, D.H., Chervany, N.L. The meanings of trust. Tech. Rep. 96-04, MIS Research Center (1996)
    • (1996)
    • McKnight, D.H.1    Chervany, N.L.2
  • 36
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre G., Opdahl A.L. (2005) Eliciting security requirements with misuse cases. Requirements Eng. J. 10(1): 34-44
    • (2005) Requirements Eng. J. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 37
    • 0003885423 scopus 로고    scopus 로고
    • Software engineering
    • Addison-Wesley, Reading
    • Sommerville I. (2001) Software engineering. Addison-Wesley, Reading
    • (2001)
    • Sommerville, I.1
  • 38
    • 27644567989 scopus 로고    scopus 로고
    • Legal requirements reuse: A critical success factor for requirements quality and personal data protection
    • In: IEEE Press
    • Toval, A., Olmos, A., Piattini, M. Legal requirements reuse: A critical success factor for requirements quality and personal data protection. In: Proceedings of RE'02, pp.95 -103. IEEE Press (2002)
    • (2002) Proceedings of RE'02 , pp. 95-103
    • Toval, A.1    Olmos, A.2    Piattini, M.3
  • 39
    • 0035780469 scopus 로고    scopus 로고
    • Embedding security practices in contemporary information systems development approaches
    • Tryfonas T., Kiountouzis E., Poulymenakou A. (2001) Embedding security practices in contemporary information systems development approaches. Inform. Manage. Comp. Sec. 9, 183-197
    • (2001) Inform. Manage. Comp. Sec. , vol.9 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3
  • 40
    • 17744386105 scopus 로고    scopus 로고
    • From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • van Lamsweerde, A., Brohez, S., De Landtsheer, R., Janssens, D. From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. In: Proceedings of RHAS'03, pp. 49-56 (2003)
    • (2003) Proceedings of RHAS'03 , pp. 49-56
    • van Lamsweerde, A.1    Brohez, S.2    De Landtsheer, R.3    Janssens, D.4
  • 41
    • 33745782245 scopus 로고    scopus 로고
    • Designing for privacy and other competing requirements
    • Yu, E., Cysneiros, L. designing for privacy and other competing requirements. In: Proceedings of SREIS'02 (2002)
    • (2002) Proceedings of SREIS'02
    • Yu, E.1    Cysneiros, L.2
  • 42
    • 0003944811 scopus 로고    scopus 로고
    • Modelling strategic relationships for process reengineering
    • Ph.D. thesis, University of Toronto
    • Yu, E.S.K. Modelling strategic relationships for process reengineering. Ph.D. thesis, University of Toronto (1996)
    • (1996)
    • Yu, E.S.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.