-
2
-
-
0242674432
-
Hippocratic databases
-
In: Morgan Kaufmann
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y. Hippocratic databases. In: Proceedings of VLDB'02, pp. 143-154. Morgan Kaufmann (2002)
-
(2002)
Proceedings of VLDB'02
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
0029697680
-
A security policy model for clinical information systems
-
In: IEEE Press
-
Anderson, R. A security policy model for clinical information systems. In: Proceedings of Symposium on Security and Privacy, pp. 30-43. IEEE Press (1996)
-
(1996)
Proceedings of Symposium on Security and Privacy
, pp. 30-43
-
-
Anderson, R.1
-
4
-
-
17744389340
-
A requirements taxonomy for reducing Web site privacy vulnerabilities
-
Antón AI., Earp JB. (2004) A requirements taxonomy for reducing Web site privacy vulnerabilities. Requirements Eng. J. 9(3): 169-185
-
(2004)
Requirements Eng. J.
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
6
-
-
0040704448
-
Managing the paradox of organizational trust
-
Barnes LB. (1981) Managing the paradox of organizational trust. Harvard Bus. Rev. 59(2): 107-116
-
(1981)
Harvard Bus. Rev.
, vol.59
, Issue.2
, pp. 107-116
-
-
Barnes, L.B.1
-
7
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin D., Doser J., Lodderstedt T. (2006) Model driven security: From UML models to access control infrastructures. TOSEM 15(1): 39-91
-
(2006)
TOSEM
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
8
-
-
84982899264
-
The role of trust management in distributed systems security
-
Blaze M., Feigenbaum J., Ioannidis J., Keromytis A.D. (1999) The role of trust management in distributed systems security. secure internet programming 1603, 185-210
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
10
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
Bresciani P., Giorgini P., Giunchiglia F., Mylopoulos J., Perini A. (2004) TROPOS: An agent-oriented software development methodology. JAAMAS 8(3): 203-236
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
11
-
-
85041439566
-
Principles of trust for MAS: Cognitive anatomy, social importance and quantification
-
In: IEEE Press
-
Castelfranchi, C., Falcone, R. Principles of trust for MAS: Cognitive anatomy, social importance and quantification. In: Proceedings of ICMAS'98, pp. 72-79. IEEE Press (1998)
-
(1998)
Proceedings of ICMAS'98
, pp. 72-79
-
-
Castelfranchi, C.1
Falcone, R.2
-
12
-
-
0001470602
-
REFEREE: Trust management for web applications
-
Chu Y.H., Feigenbaum J., LaMacchia B., Resnick P., Strauss M. (1997) REFEREE: Trust management for web applications. computer networks and ISDN Systems 29(8-13): 953-964
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
13
-
-
0029191009
-
Dealing with non-functional requirements: Three experimental studies of a process-oriented approach
-
In: ACM Press
-
Chung, L., Nixon, B. Dealing with non-functional requirements: Three experimental studies of a process-oriented approach. In: Proceedings of ICSE'95, pp. 25-37. ACM Press (1995)
-
(1995)
Proceedings of ICSE'95
, pp. 25-37
-
-
Chung, L.1
Nixon, B.2
-
14
-
-
0141804971
-
A policy framework for management of distributed systems
-
Ph.D. Thesis, University of London
-
Damianou, N. A policy framework for management of distributed systems. Ph.D. Thesis, University of London (2002)
-
(2002)
-
-
Damianou, N.1
-
16
-
-
27644590666
-
Requirements BEFORE the requirements: Understanding the upstream Impacts
-
In: IEEE Press
-
Ebert, C. Requirements BEFORE the requirements: Understanding the upstream Impacts. In: Proceedings of RE'05, pp. 117-124. IEEE Press (2005)
-
(2005)
Proceedings of RE'05
, pp. 117-124
-
-
Ebert, C.1
-
17
-
-
0003546303
-
Simple public key certificates
-
Internet Draft (Work in Progress)
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T. Simple public key certificates. Internet Draft (work in progress) (1999)
-
(1999)
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
18
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard
-
In: LNCS Springer, Berlin Heidelberg Newyork
-
Giorgini, P., Massacci, F., Mylopoulos, J. Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and Mastercard. In: Proceedings of ER'03, LNCS 2813, pp. 263-276. Springer, Berlin Heidelberg Newyork (2003)
-
(2003)
Proceedings of ER'03
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
19
-
-
35048857793
-
Filling the gap between requirements engineering and public key/trust management infrastructures
-
In: LNCS Springer, Berlin Heidelberg Newyork
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N. Filling the gap between requirements engineering and public key/trust management infrastructures. In: Proceedings of EuroPKI'04, LNCS 3093, pp. 98-111. Springer, Berlin Heidelberg Newyork (2004)
-
(2004)
Proceedings of EuroPKI'04
, vol.3093
, pp. 98-111
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
20
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
In: LNCS Springer, Berlin Heidelberg Newyork
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering meets trust management: Model, methodology, and reasoning. In: Proceedings of iTrust'04, LNCS 2995, pp. 176-190. Springer, Berlin Heidelberg Newyork (2004)
-
(2004)
Proceedings of ITrust'04
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
21
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
In: IEEE Press
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N. Modeling security requirements through ownership, permission and delegation. In: Proceedings of RE'05, pp. 167-176. IEEE Press (2005)
-
(2005)
Proceedings of RE'05
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
22
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
In: LNCS Springer, Berlin Heidelberg Newyork
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N. Modelling social and individual trust in requirements engineering methodologies. In: Proceedings of iTrust'05, LNCS 3477, pp. 161-176. Springer, Berlin Heidelberg Newyork (2005)
-
(2005)
Proceedings of ITrust'05
, vol.3477
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
23
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
In: IEEE Press
-
Jim, T. SD3: A trust management system with certified evaluation. In: Proceedings of Symposium on Security and Privacy, pp. 106-115. IEEE Press (2001)
-
(2001)
Proceedings of Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
24
-
-
84891477511
-
Secure Systems Development with UML
-
Springer
-
Jürjens, J. Secure Systems Development with UML. Springer, (2004)
-
(2004)
-
-
Jürjens, J.1
-
25
-
-
1242285342
-
The DLV System for knowledge representation and reasoning
-
Leone, N., Pfeifer, G., Faber, W., Eiter, T., Gottlob, G., Perri, S., Scarcello, F. The DLV System for knowledge representation and reasoning. TOCL (2005)
-
(2005)
TOCL
-
-
Leone, N.1
Pfeifer, G.2
Faber, W.3
Eiter, T.4
Gottlob, G.5
Perri, S.6
Scarcello, F.7
-
26
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li N., Grosof B.N., Feigenbaum J. (2003) Delegation logic: A logic-based approach to distributed authorization. TISSEC 6(1): 128-171
-
(2003)
TISSEC
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
27
-
-
84948440714
-
Design a role-based trust-management framework
-
In: IEEE Press
-
Li, N., Mitchell, J.C., Winsborough, W.H. Design a role-based trust-management framework. In: Proceedings of Symposium on Security and Privacy, pp. 114-130. IEEE Press (2002)
-
(2002)
Proceedings of Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
28
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
In: IEEE Press
-
Liu, L., Yu, E.S.K., Mylopoulos, J. Security and Privacy Requirements Analysis within a Social Setting. In: Proceedings of RE'03, pp. 151-161. IEEE Press (2003)
-
(2003)
Proceedings of RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
29
-
-
34249110788
-
From hippocratic databases to secure tropos: A computer-aided re- engineering Approach
-
(in press)
-
Massacci, F., Mylopoulos, J., Zannone, N. From hippocratic databases to secure tropos: A computer-aided re- engineering Approach. IJSEKE (2006). (in press).
-
(2006)
IJSEKE
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
31
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation
-
Massacci F., Prest M., Zannone N. (2005) Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation. Comp. Stand. Inter. 27(5): 445-455
-
(2005)
Comp. Stand. Inter.
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
32
-
-
33746078483
-
Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the allied irish bank
-
Tech. Rep. DIT-06-002, University of Trento
-
Massacci, F., Zannone, N. Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the allied irish bank. Tech. Rep. DIT-06-002, University of Trento (2006)
-
(2006)
-
-
Massacci, F.1
Zannone, N.2
-
33
-
-
85045573601
-
Using abuse case models for security requirements Analysis
-
In: IEEE Press
-
McDermott, J., Fox, C. Using abuse case models for security requirements Analysis. In: Proceedings of ACSAC'99, pp. 55-66. IEEE Press (1999)
-
(1999)
Proceedings of ACSAC'99
, pp. 55-66
-
-
McDermott, J.1
Fox, C.2
-
34
-
-
0141862713
-
The meanings of trust
-
Tech. Rep. 96-04, MIS Research Center
-
McKnight, D.H., Chervany, N.L. The meanings of trust. Tech. Rep. 96-04, MIS Research Center (1996)
-
(1996)
-
-
McKnight, D.H.1
Chervany, N.L.2
-
35
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. (1996) Role-based access control models. IEEE Comp. 29(2): 38-47
-
(1996)
IEEE Comp.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
36
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre G., Opdahl A.L. (2005) Eliciting security requirements with misuse cases. Requirements Eng. J. 10(1): 34-44
-
(2005)
Requirements Eng. J.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
37
-
-
0003885423
-
Software engineering
-
Addison-Wesley, Reading
-
Sommerville I. (2001) Software engineering. Addison-Wesley, Reading
-
(2001)
-
-
Sommerville, I.1
-
38
-
-
27644567989
-
Legal requirements reuse: A critical success factor for requirements quality and personal data protection
-
In: IEEE Press
-
Toval, A., Olmos, A., Piattini, M. Legal requirements reuse: A critical success factor for requirements quality and personal data protection. In: Proceedings of RE'02, pp.95 -103. IEEE Press (2002)
-
(2002)
Proceedings of RE'02
, pp. 95-103
-
-
Toval, A.1
Olmos, A.2
Piattini, M.3
-
39
-
-
0035780469
-
Embedding security practices in contemporary information systems development approaches
-
Tryfonas T., Kiountouzis E., Poulymenakou A. (2001) Embedding security practices in contemporary information systems development approaches. Inform. Manage. Comp. Sec. 9, 183-197
-
(2001)
Inform. Manage. Comp. Sec.
, vol.9
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
-
40
-
-
17744386105
-
From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
-
van Lamsweerde, A., Brohez, S., De Landtsheer, R., Janssens, D. From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering. In: Proceedings of RHAS'03, pp. 49-56 (2003)
-
(2003)
Proceedings of RHAS'03
, pp. 49-56
-
-
van Lamsweerde, A.1
Brohez, S.2
De Landtsheer, R.3
Janssens, D.4
-
41
-
-
33745782245
-
Designing for privacy and other competing requirements
-
Yu, E., Cysneiros, L. designing for privacy and other competing requirements. In: Proceedings of SREIS'02 (2002)
-
(2002)
Proceedings of SREIS'02
-
-
Yu, E.1
Cysneiros, L.2
-
42
-
-
0003944811
-
Modelling strategic relationships for process reengineering
-
Ph.D. thesis, University of Toronto
-
Yu, E.S.K. Modelling strategic relationships for process reengineering. Ph.D. thesis, University of Toronto (1996)
-
(1996)
-
-
Yu, E.S.K.1
|