메뉴 건너뛰기




Volumn 14, Issue 3, 2007, Pages 341-364

Computer-aided support for secure tropos

Author keywords

Automated reasoning; CASE tools; Security requirements engineering

Indexed keywords

CASE BASED REASONING; COMPUTER AIDED SOFTWARE ENGINEERING; FORMAL LOGIC; MATHEMATICAL MODELS; SECURITY OF DATA; SPECIFICATIONS;

EID: 34548563765     PISSN: 09288910     EISSN: 15737535     Source Type: Journal    
DOI: 10.1007/s10515-007-0013-5     Document Type: Article
Times cited : (31)

References (59)
  • 2
    • 17244368461 scopus 로고
    • Technical Report TR86-727, Cornell University, Computer Science Department
    • Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Technical Report TR86-727, Cornell University, Computer Science Department (1986)
    • (1986) Recognizing Safety and Liveness
    • Alpern, B.1    Schneider, F.B.2
  • 3
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • 11
    • Anderson, R.: Why cryptosystems fail. Commun. ACM 37(11), 32-40 (1994)
    • (1994) Commun. ACM , vol.37 , pp. 32-40
    • Anderson, R.1
  • 7
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • 1
    • Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006)
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 13
    • 0030615545 scopus 로고    scopus 로고
    • GRAIL/KAOS: An environment for goal-driven requirements engineering
    • ACM Press New York
    • Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A.: GRAIL/KAOS: an environment for goal-driven requirements engineering. In: Proc. of ICSE'97, pp. 612-613. ACM Press, New York (1997)
    • (1997) Proc. of ICSE'97 , pp. 612-613
    • Darimont, R.1    Delor, E.2    Massonet, P.3    Van Lamsweerde, A.4
  • 14
    • 32344449269 scopus 로고    scopus 로고
    • Reasoning about confidentiality at requirements engineering time
    • ACM Press New York
    • De Landtsheer, R., van Lamsweerde, A.: Reasoning about confidentiality at requirements engineering time. In: Proc. of ESEC/FSE'05, pp. 41-49. ACM Press, New York (2005)
    • (2005) Proc. of ESEC/FSE'05 , pp. 41-49
    • De Landtsheer, R.1    Van Lamsweerde, A.2
  • 16
    • 34848909002 scopus 로고    scopus 로고
    • Visualizing non-functional requirements
    • IEEE Press New York
    • Ernst, N.A., Yu, Y., Mylopoulos, J.: Visualizing non-functional requirements. In: Proc. of REV'06, p. 2. IEEE Press, New York (2006)
    • (2006) Proc. of REV'06 , pp. 2
    • Ernst, N.A.1    Yu, Y.2    Mylopoulos, J.3
  • 17
    • 0024103950 scopus 로고
    • Critiquing software specifications
    • 6
    • Fickas, S., Nagarajan, P.: Critiquing software specifications. IEEE Softw. 5(6), 37-47 (1988)
    • (1988) IEEE Softw. , vol.5 , pp. 37-47
    • Fickas, S.1    Nagarajan, P.2
  • 19
    • 0001119421 scopus 로고
    • The stable model semantics for logic programming
    • MIT Press Cambridge
    • Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. of ICLP'88, pp. 1070-1080. MIT Press, Cambridge (1988)
    • (1988) Proc. of ICLP'88 , pp. 1070-1080
    • Gelfond, M.1    Lifschitz, V.2
  • 20
    • 77951505493 scopus 로고
    • Classical negation in logic programs and disjunctive databases
    • 3/4
    • Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Gener. Comput. 9(3/4), 365-386 (1991)
    • (1991) New Gener. Comput. , vol.9 , pp. 365-386
    • Gelfond, M.1    Lifschitz, V.2
  • 22
    • 24944578244 scopus 로고    scopus 로고
    • Modelling social and individual trust in requirements engineering methodologies
    • Proc. of iTrust'05 Springer Berlin
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modelling social and individual trust in requirements engineering methodologies. In: Proc. of iTrust'05. Lecture Notes in Computer Science, vol. 3477, pp. 161-176. Springer, Berlin (2005a)
    • (2005) Lecture Notes in Computer Science , vol.3477 , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 23
    • 84924413055 scopus 로고    scopus 로고
    • Security and trust requirements engineering
    • FOSAD 2004/2005 Springer Berlin
    • Giorgini, P., Massacci, F., Zannone, N.: Security and trust requirements engineering. In: FOSAD 2004/2005. Lecture Notes in Computer Science, vol. 3655, pp. 237-272. Springer, Berlin (2005b)
    • (2005) Lecture Notes in Computer Science , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 24
    • 33749035450 scopus 로고    scopus 로고
    • Requirements engineering for trust management: Model, methodology, and reasoning
    • 4
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inform. Sec. 5(4), 257-274 (2006)
    • (2006) Int. J. Inform. Sec. , vol.5 , pp. 257-274
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 25
    • 0030109943 scopus 로고    scopus 로고
    • Executing formal specifications need not be harmful
    • 2
    • Gravell, A.M., Henderson, P.: Executing formal specifications need not be harmful. IEE/BCS Softw. Eng. J. 11(2), 104-110 (1996)
    • (1996) IEE/BCS Softw. Eng. J. , vol.11 , pp. 104-110
    • Gravell, A.M.1    Henderson, P.2
  • 26
    • 34548557819 scopus 로고    scopus 로고
    • Arguing security: Validating security requirements using structured argumentation
    • Haley, C.B., Moffett, J., Laney, R., Nuseibeh, B.: Arguing security: validating security requirements using structured argumentation. In: Proc. of SREIS'05 (2005)
    • (2005) Proc. of SREIS'05
    • Haley, C.B.1    Moffett, J.2    Laney, R.3    Nuseibeh, B.4
  • 27
    • 84863906471 scopus 로고    scopus 로고
    • SCR*: A toolset for specifying and analyzing software requirements
    • Springer Berlin
    • Heitmeyer, C.L., Kirby, J., Labaw, B.G., Bharadwaj, R.: SCR*: A toolset for specifying and analyzing software requirements. In: Proc. of CAV'98, pp. 526-531. Springer, Berlin (1998)
    • (1998) Proc. of CAV'98 , pp. 526-531
    • Heitmeyer, C.L.1    Kirby, J.2    Labaw, B.G.3    Bharadwaj, R.4
  • 28
    • 34548584165 scopus 로고    scopus 로고
    • House of Lords, P.: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999). Available on
    • House of Lords, P.: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999). Available on www.parliament.the-stationeryoffice.co.uk
  • 29
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A lightweight object modelling notation
    • 2
    • Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. 11(2), 256-290 (2002)
    • (2002) ACM Trans. Softw. Eng. Methodol. , vol.11 , pp. 256-290
    • Jackson, D.1
  • 30
    • 34548589350 scopus 로고    scopus 로고
    • V2: Using violation and vulnerability analysis to understand the root causes of complex security incidents
    • Submitted to
    • Johnson, C.W.: V2: using violation and vulnerability analysis to understand the root causes of complex security incidents. Submitted to ACM Trans. Inf. Syst. Secur. (2006)
    • (2006) ACM Trans. Inf. Syst. Secur.
    • Johnson, C.W.1
  • 34
    • 84879948745 scopus 로고    scopus 로고
    • Disjunctive answer set programming via satisfiability
    • Proc. of the 3rd Int. Workshop on Answer Set Prog.: Adv. in Theory and Implementation CEUR-WS. org
    • Lierler, Y.: Disjunctive answer set programming via satisfiability. In: Proc. of the 3rd Int. Workshop on Answer Set Prog.: Adv. in Theory and Implementation, CEUR Workshop Proceedings. CEUR-WS. org, vol. 142 (2005)
    • (2005) CEUR Workshop Proceedings , vol.142
    • Lierler, Y.1
  • 35
    • 0036923682 scopus 로고    scopus 로고
    • ASSAT: Computing answer sets of a logic program by SAT solvers
    • AAAI Press Menlo Park
    • Lin, F., Zhao, Y.: ASSAT: computing answer sets of a logic program by SAT solvers. In: Proc. of the 18th Nat. Conf. on Artif. Intell, pp. 112-117. AAAI Press, Menlo Park (2002)
    • (2002) Proc. of the 18th Nat. Conf. on Artif. Intell , pp. 112-117
    • Lin, F.1    Zhao, Y.2
  • 36
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • IEEE Press New York
    • Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proc. of RE'03, pp. 151-161. IEEE Press, New York (2003)
    • (2003) Proc. of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 37
    • 84969387974 scopus 로고
    • Exploiting reusable specifications through analogy
    • 4
    • Maiden, N., Sutcliffe, A.: Exploiting reusable specifications through analogy. CACM 35(4), 55-64 (1992)
    • (1992) CACM , vol.35 , pp. 55-64
    • Maiden, N.1    Sutcliffe, A.2
  • 38
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • 5
    • Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput. Stand. Interfaces 27(5), 445-455 (2005)
    • (2005) Comput. Stand. Interfaces , vol.27 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 40
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • IEEE Press New York
    • McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proc. of ACSAC'99, pp. 55-66. IEEE Press, New York (1999)
    • (1999) Proc. of ACSAC'99 , pp. 55-66
    • McDermott, J.1    Fox, C.2
  • 42
    • 0002103329 scopus 로고    scopus 로고
    • Efficient implementation of the well-founded and stable model semantics
    • MIT Press Cambridge
    • Niemelä, I., Simons, P.: Efficient implementation of the well-founded and stable model semantics. In: Proc. of JICSLP'96, pp. 289-303. MIT Press, Cambridge (1996)
    • (1996) Proc. of JICSLP'96 , pp. 289-303
    • Niemelä, I.1    Simons, P.2
  • 44
    • 85023009798 scopus 로고    scopus 로고
    • Requirements engineering: A roadmap
    • ACM Press New York
    • Nuseibeh, B., Easterbrook, S.: Requirements engineering: a roadmap. In: Proc. of ICSE'00, pp. 35-46. ACM Press, New York (2000)
    • (2000) Proc. of ICSE'00 , pp. 35-46
    • Nuseibeh, B.1    Easterbrook, S.2
  • 45
    • 34250014499 scopus 로고    scopus 로고
    • Modeling and reasoning for confidentiality requirements in software development
    • IEEE Press New York
    • Onabajo, A., Jahnke, J.H.: Modeling and reasoning for confidentiality requirements in software development. In: Proc. of ECBS'06, pp. 460-467. IEEE Press, New York (2006)
    • (2006) Proc. of ECBS'06 , pp. 460-467
    • Onabajo, A.1    Jahnke, J.H.2
  • 46
    • 22944459190 scopus 로고    scopus 로고
    • Developing tools for agent-oriented visual modeling
    • Proc. of MATES'04 Springer Berlin
    • Perini, A., Susi, A.: Developing tools for agent-oriented visual modeling. In: Proc. of MATES'04. Lecture Notes in Computer Science, vol. 3187, pp. 169-182. Springer, Berlin (2004)
    • (2004) Lecture Notes in Computer Science , vol.3187 , pp. 169-182
    • Perini, A.1    Susi, A.2
  • 47
    • 34548547506 scopus 로고    scopus 로고
    • Promontory Financial Group, Wachtell, Lipton, Rosen, Katz: Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses 2003
    • Promontory Financial Group, Wachtell, Lipton, Rosen, Katz: Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (2003)
  • 49
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • 9
    • Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975)
    • (1975) Proc. IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 50
    • 84881617712 scopus 로고    scopus 로고
    • Model-based development of embedded systems
    • Proc. of OOIS'02 Springer Berlin
    • Schätz, B., Pretschner, A., Huber, F., Philipps, J.: Model-based development of embedded systems. In: Proc. of OOIS'02. Lecture Notes in Computer Science, vol. 2426, pp. 298-312. Springer, Berlin (2002)
    • (2002) Lecture Notes in Computer Science , vol.2426 , pp. 298-312
    • Schätz, B.1    Pretschner, A.2    Huber, F.3    Philipps, J.4
  • 53
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • 1
    • Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. J. 10(1), 34-44 (2005)
    • (2005) Requir. Eng. J. , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 55
    • 34548586060 scopus 로고    scopus 로고
    • United States of America v. John M. Rusnak. SMS/SD/USAO #2002R02005
    • US Department of Justice: United States of America v. John M. Rusnak. SMS/SD/USAO #2002R02005. (2002). http://www.usdoj.gov/dag/cftf/chargingdocs/ allfirst.pdf
    • (2002)
  • 56
    • 0042266501 scopus 로고
    • The alternating fixpoint of logic programs with negation
    • ACM Press New York
    • van Gelder, A.: The alternating fixpoint of logic programs with negation. In: Proc. of PODS'89, pp. 1-10. ACM Press, New York (1989)
    • (1989) Proc. of PODS'89 , pp. 1-10
    • Van Gelder, A.1
  • 57
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • IEEE Press New York
    • van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proc. of ICSE'04, pp. 148-157. IEEE Press, New York (2004)
    • (2004) Proc. of ICSE'04 , pp. 148-157
    • Van Lamsweerde, A.1
  • 58
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • 10
    • van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26(10), 978-1005 (2000)
    • (2000) IEEE Trans. Softw. Eng. , vol.26 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.