메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 71-76

Security design based on social modeling

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER CRIME; COMPUTER SIMULATION; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; LOGIC DESIGN;

EID: 34247543539     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2006.159     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 1
    • 0029697680 scopus 로고    scopus 로고
    • Anderson, R. A Security Policy Model for Clinical Information Systems. IEEE Symposium on Security and Privacy, Los Alamitos, 1996. pp. 30-43.
    • Anderson, R. A Security Policy Model for Clinical Information Systems. IEEE Symposium on Security and Privacy, Los Alamitos, 1996. pp. 30-43.
  • 3
    • 84979855000 scopus 로고
    • Dealing with Security Requirements During the Development of Information Systems. Proc. CAiSE'93
    • Systems Engineering, Collette Rolland, Francois Bodart, Corine Cauvet Eds, Springer
    • th Int. Conf. Advanced Information Systems Engineering, Collette Rolland, Francois Bodart, Corine Cauvet (Eds.). Springer, 1993. pp.234-251
    • (1993) th Int. Conf. Advanced Information , pp. 234-251
    • Chung, L.1
  • 6
    • 15944398393 scopus 로고    scopus 로고
    • Helmer, G., Wong, J., Slagell, M., Honavar, V. Miller, L., Lutz, R. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Anton, Requirements Engineering. 7, N0. 4, 2002. pp. 177-220.
    • Helmer, G., Wong, J., Slagell, M., Honavar, V. Miller, L., Lutz, R. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Anton, Requirements Engineering. Vol. 7, N0. 4, 2002. pp. 177-220.
  • 9
    • 0030086382 scopus 로고    scopus 로고
    • Sandhu, R. S., Coyne, E.J., Feinstein, H.L., Youman, C.E. Role-Based Access Control Models. IEEE Computer, 29, No.2, Feburary 1996. pp. 38-47.
    • Sandhu, R. S., Coyne, E.J., Feinstein, H.L., Youman, C.E. Role-Based Access Control Models. IEEE Computer, Vol.29, No.2, Feburary 1996. pp. 38-47.
  • 10
    • 0037252218 scopus 로고    scopus 로고
    • Good-Enough Security: Towards a Pragmatic Business-Driven Discipline
    • January/February
    • Sandu, R. Good-Enough Security: Towards a Pragmatic Business-Driven Discipline. IEEE Internet Computing. Security Track. January/February 2003. pp. 66-68.
    • (2003) IEEE Internet Computing. Security Track , pp. 66-68
    • Sandu, R.1
  • 16
    • 84942921136 scopus 로고    scopus 로고
    • Yu, E. and Liu, L. Modeling Trust for System Design Using the i* Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer,2001. pp.175-194.
    • Yu, E. and Liu, L. Modeling Trust for System Design Using the i* Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer,2001. pp.175-194.
  • 17
    • 84959052904 scopus 로고    scopus 로고
    • Agent-Oriented Modelling: Software Versus the World
    • Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings, Springer Verlag, pp
    • Yu,E. Agent-Oriented Modelling: Software Versus the World. Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings. LNCS 2222. Springer Verlag, pp. 206-225.
    • LNCS , vol.2222 , pp. 206-225
    • Yu, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.