메뉴 건너뛰기




Volumn 17, Issue 2, 2007, Pages 265-284

From Hippocratic databases to Secure Tropos: A computer-aided re-engineering approach

Author keywords

Agent oriented technologies; IS re engineering; Security engineering

Indexed keywords

AGENT-ORIENTED TECHNOLOGIES; IS RE-ENGINEERING; SECURITY ENGINEERING;

EID: 34249110788     PISSN: 02181940     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218194007003239     Document Type: Article
Times cited : (7)

References (27)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Worthmann, Security-control methods for statistical databases: A comparative study, CSUR 21(4) (1989) 515-556.
    • (1989) CSUR , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 4
    • 34249001436 scopus 로고    scopus 로고
    • The Use of Goals to Extract Privacy and Security Requirements from Policy Statements
    • Technical Report TR.-2003-17, NCSU Computer Science, September
    • A. I. Anton, D. Bolchini, and Q. He, The Use of Goals to Extract Privacy and Security Requirements from Policy Statements, Technical Report TR.-2003-17, NCSU Computer Science, September 2003.
    • (2003)
    • Anton, A.I.1    Bolchini, D.2    He, Q.3
  • 5
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing Web site privacy vulnerabilities
    • A. I. Antón and J. B. Earp, A requirements taxonomy for reducing Web site privacy vulnerabilities, Requirements Eng. J. 9(3) (2004) 169-185.
    • (2004) Requirements Eng. J , vol.9 , Issue.3 , pp. 169-185
    • Antón, A.I.1    Earp, J.B.2
  • 6
    • 2442516401 scopus 로고    scopus 로고
    • Efficient comparison of enterprise privacy policies
    • ACM Press
    • M. Backes, G. Karjoth, W. Bagga, and M. Schunter, Efficient comparison of enterprise privacy policies, in Proc. SAC'04, ACM Press, 2004, pp. 375-382.
    • (2004) Proc. SAC'04 , pp. 375-382
    • Backes, M.1    Karjoth, G.2    Bagga, W.3    Schunter, M.4
  • 7
    • 0142157015 scopus 로고    scopus 로고
    • A toolkit for managing enterprise privacy policies
    • Proc. ESORICS'03, Springer
    • M. Backes, B. Pfitzmann, and M. Schunter, A toolkit for managing enterprise privacy policies, in Proc. ESORICS'03, LNCS 2808, Springer, 2003, pp. 162-180.
    • (2003) LNCS , vol.2808 , pp. 162-180
    • Backes, M.1    Pfitzmann, B.2    Schunter, M.3
  • 8
    • 0003400251 scopus 로고
    • Secure Computer System: Unified Exposition and MULTICS Interpretation
    • Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA
    • D. E. Bell and L. J. LaPadula, Secure Computer System: Unified Exposition and MULTICS Interpretation, Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA, 1976.
    • (1976)
    • Bell, D.E.1    LaPadula, L.J.2
  • 10
    • 19944414458 scopus 로고    scopus 로고
    • Purpose-Based Access Control for Privacy Protection in Relational Database Systems
    • Technical Report 2004-52, Purdue University
    • J.-W. Byun, E. Bertino, and N. Li, Purpose-Based Access Control for Privacy Protection in Relational Database Systems, Technical Report 2004-52, Purdue University, 2004.
    • (2004)
    • Byun, J.-W.1    Bertino, E.2    Li, N.3
  • 11
    • 30644474612 scopus 로고    scopus 로고
    • Purpose based access control of complex data for privacy protection
    • ACM Press
    • J.-W. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, in Proc. SACMAT'05, ACM Press, 2005, pp. 102-110.
    • (2005) Proc. SACMAT'05 , pp. 102-110
    • Byun, J.-W.1    Bertino, E.2    Li, N.3
  • 12
    • 0013243382 scopus 로고    scopus 로고
    • The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation
    • April
    • L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation, April 2002.
    • (2002)
    • Cranor, L.1    Langheinrich, M.2    Marchiori, M.3    Reagle, J.4
  • 13
    • 84880846309 scopus 로고    scopus 로고
    • Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV
    • Morgan Kaufmann
    • T. Dell'Armi, W. Faber, G. Ielpa, N. Leone, and G. Pfeifer, Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV, in Proc. IJCAI'03, Morgan Kaufmann, 2003, pp. 847-852.
    • (2003) Proc. IJCAI'03 , pp. 847-852
    • Dell'Armi, T.1    Faber, W.2    Ielpa, G.3    Leone, N.4    Pfeifer, G.5
  • 15
    • 35048857793 scopus 로고    scopus 로고
    • Filling the gap between requirements engineering and public key/trust management infrastructures
    • Proc. EuroPKI'04, Springer
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Filling the gap between requirements engineering and public key/trust management infrastructures, in Proc. EuroPKI'04, LNCS 3093, Springer, 2004, pp. 98-111.
    • (2004) LNCS , vol.3093 , pp. 98-111
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 16
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management: Model, methodology, and reasoning
    • Proc. i'Trust'04, Springer
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Requirements engineering meets trust management: Model, methodology, and reasoning, in Proc. i'Trust'04, LNCS 2995, Springer, 2004, pp. 176-190.
    • (2004) LNCS , vol.2995 , pp. 176-190
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 17
    • 24944578244 scopus 로고    scopus 로고
    • Modelling social and individual trust in requirements engineering methodologies
    • Proc. iTrust'05, Springer
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Modelling social and individual trust in requirements engineering methodologies, in Proc. iTrust'05, LNCS 3477, Springer, 2005, pp. 161-176.
    • (2005) LNCS , vol.3477 , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 18
    • 24344462080 scopus 로고    scopus 로고
    • A framework for modeling privacy requirements in role engineering
    • Q. He and A. I. Anton, A framework for modeling privacy requirements in role engineering, in Proc. REFSQ'03, 2003, pp. 137-146.
    • (2003) Proc. REFSQ'03 , pp. 137-146
    • He, Q.1    Anton, A.I.2
  • 19
    • 84957805078 scopus 로고    scopus 로고
    • Platform for enterprise privacy practices: Privacy-enabled management of customer data
    • Proc. PET'02, Springer
    • G. Karjoth, M. Schunter, and M. Waidner, Platform for enterprise privacy practices: Privacy-enabled management of customer data, in Proc. PET'02, LNCS 2482, Springer, 2002, pp. 69-84.
    • (2002) LNCS , vol.2482 , pp. 69-84
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 21
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • IEEE Press
    • L. Liu, E. S. K. Yu, and J. Mylopoulos, Security and privacy requirements analysis within a social setting, in Proc. RE'03, IEEE Press, 2003, pp. 151-161.
    • (2003) Proc. RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 22
    • 36049032185 scopus 로고    scopus 로고
    • Hierarchical hippocratic databases with minimal disclosure for virtual organizations
    • F. Massacci, J. Mylopoulos, and N. Zannone, Hierarchical hippocratic databases with minimal disclosure for virtual organizations, The VLDB J., 2006.
    • (2006) The VLDB J
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 23
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • F. Massacci, M. Prest, and N. Zannone, Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation, Comp. Standards & Interfaces 27(5) (2005) 445-455.
    • (2005) Comp. Standards & Interfaces , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 25
    • 84874834655 scopus 로고    scopus 로고
    • Privacy promises, access control, and privacy management: Enforcing privacy throughout an enterprise by extending access control
    • IEEE Press
    • C. S. Powers P. Ashley, and M. Schunter, Privacy promises, access control, and privacy management: Enforcing privacy throughout an enterprise by extending access control, in Proc. ISEC'02, IEEE Press, 2002, pp. 13-21.
    • (2002) Proc. ISEC'02 , pp. 13-21
    • Powers, C.S.1    Ashley, P.2    Schunter, M.3
  • 27
    • 17744386105 scopus 로고    scopus 로고
    • From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering
    • A. van Lamsweerde, S. Brohez, R. De Landtsheer, and D. Janssens, From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering, in Proc. RHAS'03, 2003, pp. 49-56.
    • (2003) Proc. RHAS'03 , pp. 49-56
    • van Lamsweerde, A.1    Brohez, S.2    De Landtsheer, R.3    Janssens, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.