-
1
-
-
45849138846
-
Modelling risk and identifying countermeasures in organizations
-
Y. Asnar and P. Giorgini. Modelling risk and identifying countermeasures in organizations. In Proc. of CRITIS'06, 2006.
-
(2006)
Proc. of CRITIS'06
-
-
Asnar, Y.1
Giorgini, P.2
-
2
-
-
34548158508
-
Risk Modelling and Reasoning in Goal Models
-
Technical Report DIT-06-008, University of Trento
-
Y. Asnar, P. Giorgini, and J. Mylopoulos. Risk Modelling and Reasoning in Goal Models. Technical Report DIT-06-008, University of Trento, 2006.
-
(2006)
-
-
Asnar, Y.1
Giorgini, P.2
Mylopoulos, J.3
-
3
-
-
12344308304
-
Basic Concepts and Taxonomy of Dependable and Secure Computing
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. E. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. TDSC, 1(1):11-33, 2004.
-
(2004)
TDSC
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.E.4
-
5
-
-
1642518660
-
Simulation and Verification I: Formal Analysis of Air Traffic Management Systems: The Case of Conflict Resolution and Recovery
-
IEEE Press
-
R. Butler, J. Maddalon, A. Geser, and C. Muñoz. Simulation and Verification I: Formal Analysis of Air Traffic Management Systems: The Case of Conflict Resolution and Recovery. In Proc. of WSC'03, pages 906-914. IEEE Press, 2003.
-
(2003)
Proc. of WSC'03
, pp. 906-914
-
-
Butler, R.1
Maddalon, J.2
Geser, A.3
Muñoz, C.4
-
7
-
-
34548175498
-
-
S. Campadello, L. Compagna, D. Gidoin, P. Giorgini, S. Holtmanns, J. Latanicki, V. Meduri, J.-C. Pazzaglia, M. Seguran, R. Thomas, and N. Zannone. S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium, 2006.
-
S. Campadello, L. Compagna, D. Gidoin, P. Giorgini, S. Holtmanns, J. Latanicki, V. Meduri, J.-C. Pazzaglia, M. Seguran, R. Thomas, and N. Zannone. S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium, 2006.
-
-
-
-
8
-
-
33750199540
-
Trust Relations in High-Reliability Organizations
-
S. Cox, B. Jones, and D. Collinson. Trust Relations in High-Reliability Organizations. Risk Analysis, 26(5): 1123-1138, 2006.
-
(2006)
Risk Analysis
, vol.26
, Issue.5
, pp. 1123-1138
-
-
Cox, S.1
Jones, B.2
Collinson, D.3
-
11
-
-
16244392439
-
Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and its System Interface
-
IEEE Press
-
M. S. Feather. Towards a Unified Approach to the Representation of, and Reasoning with, Probabilistic Risk Information about Software and its System Interface. In Proc. of ISSRE'04, pages 391-402. IEEE Press, 2004.
-
(2004)
Proc. of ISSRE'04
, pp. 391-402
-
-
Feather, M.S.1
-
12
-
-
13244278129
-
Applications of tool support for risk-informed requirements reasoning
-
M. S. Feather, S. L. Cornford, K. A. Hicks, and K. R. Johnson. Applications of tool support for risk-informed requirements reasoning. Computer Systems Science & Engineering, 20(1):5-17, 2005.
-
(2005)
Computer Systems Science & Engineering
, vol.20
, Issue.1
, pp. 5-17
-
-
Feather, M.S.1
Cornford, S.L.2
Hicks, K.A.3
Johnson, K.R.4
-
13
-
-
84949226562
-
The CORAS framework for a model-based risk management process
-
Proc. of SAFECOMP'02, Springer-Verlag
-
R. Fredriksen, M. Kristiansenand, B. A. Granand, K. Stølen, T. A. Opperud, and T. Dimitrakos. The CORAS framework for a model-based risk management process. In Proc. of SAFECOMP'02, LNCS 2434, pages 94-105. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2434
, pp. 94-105
-
-
Fredriksen, R.1
Kristiansenand, M.2
Granand, B.A.3
Stølen, K.4
Opperud, T.A.5
Dimitrakos, T.6
-
14
-
-
27644537252
-
Modeling Security Requirements Through Ownership, Permission and Delegation
-
IEEE Press
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176. IEEE Press, 2005.
-
(2005)
Proc. of RE'05
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
15
-
-
24944578244
-
Modelling Social and Individual Trust in Requirements Engineering Methodologies
-
Proc. of iTrust'05, Springer-Verlag
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modelling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05, LNCS 3477, pages 161-176. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3477
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
16
-
-
0242371015
-
Formal Reasoning Techniques for Goal Models
-
P. Giorgini, J. Mylopoulos, E. Nicchiarelli, and R. Sebastiani. Formal Reasoning Techniques for Goal Models. Journal of Data Semantics, 1(1): 1-20, 2003.
-
(2003)
Journal of Data Semantics
, vol.1
, Issue.1
, pp. 1-20
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, E.3
Sebastiani, R.4
-
17
-
-
33747440391
-
Safety Validation of Dependable Transportation Systems
-
J. Jacobson. Safety Validation of Dependable Transportation Systems. In Proc. of ITSC'05, pages 1-6, 2005.
-
(2005)
Proc. of ITSC'05
, pp. 1-6
-
-
Jacobson, J.1
-
18
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
ACM Press
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proc. of PODS'97, pages 474-485. ACM Press, 1997.
-
(1997)
Proc. of PODS'97
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
19
-
-
35048832333
-
Analysing the Relationship Between Risk and Trust
-
Proc. of iTrust '04, Springer-Verlag
-
A. Jøsang and S. Presti. Analysing the Relationship Between Risk and Trust. In Proc. of iTrust '04, LNCS 2995, pages 135-145. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2995
, pp. 135-145
-
-
Jøsang, A.1
Presti, S.2
-
20
-
-
34548174728
-
Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems
-
S. Lee, R. Gandhi, and G. Ahn. Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems. In Proc. of SREIS'05, 2005.
-
(2005)
Proc. of SREIS'05
-
-
Lee, S.1
Gandhi, R.2
Ahn, G.3
-
22
-
-
84883288824
-
Towards a Risk-Based Security Requirements Engineering Framework
-
N. Mayer, A. Rifaut, and E. Dubois. Towards a Risk-Based Security Requirements Engineering Framework. In Proc. of REFSQ '05, 2005.
-
(2005)
Proc. of REFSQ '05
-
-
Mayer, N.1
Rifaut, A.2
Dubois, E.3
-
23
-
-
12344275676
-
Model-Based Evaluation: From Dependability to Security
-
D. M. Nicol, W. H. Sanders, and K. S. Trivedi. Model-Based Evaluation: From Dependability to Security. TDSC, 1(1):48-65, 2004.
-
(2004)
TDSC
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
26
-
-
9444250310
-
-
NASA
-
M. Stamatelatos, W. Vesely, J. Dugan, J. Fragola, J. Minarick, and J. Railsback. Fault Tree Handbook with Aerospace Applications. NASA, 2002.
-
(2002)
Fault Tree Handbook with Aerospace Applications
-
-
Stamatelatos, M.1
Vesely, W.2
Dugan, J.3
Fragola, J.4
Minarick, J.5
Railsback, J.6
|