메뉴 건너뛰기




Volumn , Issue , 2007, Pages 149-153

How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach

Author keywords

Health care; Legal requirements; Organization; Pattern validation; Security privacy patterns

Indexed keywords

INFRASTRUCTURE; LEGAL REQUIREMENTS; PATTERN VALIDATION; PRIVACY LEGISLATION;

EID: 34548045316     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1276318.1276346     Document Type: Conference Paper
Times cited : (40)

References (15)
  • 1
    • 85033566750 scopus 로고
    • Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation
    • ACM Press
    • T. J. M. Bench-Capon, G. O. Robinson, T. W. Routen, and M. J. Sergot. Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation. In Proc. of ICAIL'87, pages 190-198. ACM Press, 1987.
    • (1987) Proc. of ICAIL'87 , pp. 190-198
    • Bench-Capon, T.J.M.1    Robinson, G.O.2    Routen, T.W.3    Sergot, M.J.4
  • 2
    • 0142166366 scopus 로고    scopus 로고
    • A model of legal reasoning with cases incorporating theories and values
    • T. J. M. Bench-Capon and G. Sartor. A model of legal reasoning with cases incorporating theories and values. Artif Intell., 150(1-2):97-143, 2003.
    • (2003) Artif Intell , vol.150 , Issue.1-2 , pp. 97-143
    • Bench-Capon, T.J.M.1    Sartor, G.2
  • 3
    • 34548039861 scopus 로고    scopus 로고
    • K. D.M. and E. M.C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http://www.scrypt.net/
    • K. D.M. and E. M.C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http://www.scrypt.net/
  • 4
    • 34548046354 scopus 로고    scopus 로고
    • E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001.
    • E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001.
  • 6
    • 84924413055 scopus 로고    scopus 로고
    • Security and Trust Requirements Engineering
    • FOSAD 2004/, Springer-Verlag
    • P. Giorgini, F. Massacci, and N. Zannone. Security and Trust Requirements Engineering. In FOSAD 2004/2005, LNCS 3655, pages 237-272. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 8
    • 84979103541 scopus 로고
    • Law and logic
    • S. Kanger. Law and logic. Theoria, 38(3):105-132, 1972.
    • (1972) Theoria , vol.38 , Issue.3 , pp. 105-132
    • Kanger, S.1
  • 9
  • 10
    • 34548030099 scopus 로고
    • Computer Representation of the Law
    • Morgan Kaufmann
    • R. A. Kowalski and M. J. Sergot. Computer Representation of the Law. In Proc. of IJCAI'05, pages 1269-1270. Morgan Kaufmann, 1985.
    • (1985) Proc. of IJCAI'05 , pp. 1269-1270
    • Kowalski, R.A.1    Sergot, M.J.2
  • 11
    • 0542386004 scopus 로고
    • How to write a long formula
    • L. Lamport. How to write a long formula. Formal Aspects of Comp., 6(5):580-584, 1994.
    • (1994) Formal Aspects of Comp , vol.6 , Issue.5 , pp. 580-584
    • Lamport, L.1
  • 13
    • 34548014416 scopus 로고    scopus 로고
    • H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In In Proc. of ER'05, 2005.
    • H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In In Proc. of ER'05, 2005.
  • 15
    • 34548047575 scopus 로고    scopus 로고
    • J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997.
    • J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.