-
1
-
-
0242674432
-
Hippocratic databases
-
Kaufmann Los Altos
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of VLDB'02, pp. 143-154. Kaufmann, Los Altos (2002)
-
(2002)
Proc. of VLDB'02
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
17244368461
-
-
Technical Report TR86-727, Cornell University, Computer Science Department
-
Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Technical Report TR86-727, Cornell University, Computer Science Department (1986)
-
(1986)
Recognizing Safety and Liveness
-
-
Alpern, B.1
Schneider, F.B.2
-
3
-
-
0028532579
-
Why cryptosystems fail
-
11
-
Anderson, R.: Why cryptosystems fail. Commun. ACM 37(11), 32-40 (1994)
-
(1994)
Commun. ACM
, vol.37
, pp. 32-40
-
-
Anderson, R.1
-
4
-
-
34548584164
-
-
Research report A1.D2.1, SERENITY consortium
-
Asnar, Y., Bonato, R., Bryl, V., Compagna, L., Dolinar, K., Giorgini, P., Holtmanns, S., Klobucar, T., Lanzi, P., Latanicki, J., Massacci, F., Meduri, V., Porekar, J., Riccucci, C., Saidane, A., Seguran, M., Yautsiukhin, A., Zannone, N.: Security and privacy requirements at organizational level. Research report A1.D2.1, SERENITY consortium (2006)
-
(2006)
Security and Privacy Requirements at Organizational Level
-
-
Asnar, Y.1
Bonato, R.2
Bryl, V.3
Compagna, L.4
Dolinar, K.5
Giorgini, P.6
Holtmanns, S.7
Klobucar, T.8
Lanzi, P.9
Latanicki, J.10
Massacci, F.11
Meduri, V.12
Porekar, J.13
Riccucci, C.14
Saidane, A.15
Seguran, M.16
Yautsiukhin, A.17
Zannone, N.18
-
6
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
1
-
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.E.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 11-33 (2004)
-
(2004)
IEEE Trans. Dependable Secur. Comput.
, vol.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.E.4
-
7
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
1
-
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006)
-
(2006)
ACM Trans. Softw. Eng. Methodol.
, vol.15
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
9
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
3
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: an agent-oriented software development methodology. J. Auton. Agents Multi-Agent Syst. 8(3), 203-236 (2004)
-
(2004)
J. Auton. Agents Multi-Agent Syst.
, vol.8
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
10
-
-
84889873708
-
Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC
-
Springer Berlin
-
Buckingham Shum, S.J., Selvin, A.M., Sierhuis, M., Conklin, J., Haley, C.B., Nuseibeh, B.: Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC. In: Rationale Management in Software Engineering, pp. 105-126. Springer, Berlin (2006)
-
(2006)
Rationale Management in Software Engineering
, pp. 105-126
-
-
Buckingham Shum, S.J.1
Selvin, A.M.2
Sierhuis, M.3
Conklin, J.4
Haley, C.B.5
Nuseibeh, B.6
-
11
-
-
0003696305
-
-
Kluwer Dordrecht
-
Chung, L.K., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer, Dordrecht (2000)
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.K.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
12
-
-
0027574423
-
Goal-directed requirements acquisition
-
Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed requirements acquisition. Sci. Comput. Prog. 20, 3-50 (1993)
-
(1993)
Sci. Comput. Prog.
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
13
-
-
0030615545
-
GRAIL/KAOS: An environment for goal-driven requirements engineering
-
ACM Press New York
-
Darimont, R., Delor, E., Massonet, P., van Lamsweerde, A.: GRAIL/KAOS: an environment for goal-driven requirements engineering. In: Proc. of ICSE'97, pp. 612-613. ACM Press, New York (1997)
-
(1997)
Proc. of ICSE'97
, pp. 612-613
-
-
Darimont, R.1
Delor, E.2
Massonet, P.3
Van Lamsweerde, A.4
-
14
-
-
32344449269
-
Reasoning about confidentiality at requirements engineering time
-
ACM Press New York
-
De Landtsheer, R., van Lamsweerde, A.: Reasoning about confidentiality at requirements engineering time. In: Proc. of ESEC/FSE'05, pp. 41-49. ACM Press, New York (2005)
-
(2005)
Proc. of ESEC/FSE'05
, pp. 41-49
-
-
De Landtsheer, R.1
Van Lamsweerde, A.2
-
15
-
-
85189788266
-
The CORAS methodology: Model-based risk assessment using UML and UP
-
Idea Group Publishing New York
-
den Braber, F., Dimitrakos, T., Gran, B.A., Lund, M.S., Stølen, K., Aagedal, J.∅.: The CORAS methodology: model-based risk assessment using UML and UP. In: UML and the Unified Process, pp. 332-357. Idea Group Publishing, New York (2003)
-
(2003)
UML and the Unified Process
, pp. 332-357
-
-
Den Braber, F.1
Dimitrakos, T.2
Gran, B.A.3
Lund, M.S.4
Stølen, K.5
Aagedal, J.6
-
16
-
-
34848909002
-
Visualizing non-functional requirements
-
IEEE Press New York
-
Ernst, N.A., Yu, Y., Mylopoulos, J.: Visualizing non-functional requirements. In: Proc. of REV'06, p. 2. IEEE Press, New York (2006)
-
(2006)
Proc. of REV'06
, pp. 2
-
-
Ernst, N.A.1
Yu, Y.2
Mylopoulos, J.3
-
17
-
-
0024103950
-
Critiquing software specifications
-
6
-
Fickas, S., Nagarajan, P.: Critiquing software specifications. IEEE Softw. 5(6), 37-47 (1988)
-
(1988)
IEEE Softw.
, vol.5
, pp. 37-47
-
-
Fickas, S.1
Nagarajan, P.2
-
18
-
-
15744398074
-
Specifying and analyzing early requirements in tropos
-
2
-
Fuxman, A., Liu, L., Mylopoulos, J., Pistore, M., Roveri, M., Traverso, P.: Specifying and analyzing early requirements in tropos. Requir. Eng. J. 9(2), 132-150 (2004)
-
(2004)
Requir. Eng. J.
, vol.9
, pp. 132-150
-
-
Fuxman, A.1
Liu, L.2
Mylopoulos, J.3
Pistore, M.4
Roveri, M.5
Traverso, P.6
-
19
-
-
0001119421
-
The stable model semantics for logic programming
-
MIT Press Cambridge
-
Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. of ICLP'88, pp. 1070-1080. MIT Press, Cambridge (1988)
-
(1988)
Proc. of ICLP'88
, pp. 1070-1080
-
-
Gelfond, M.1
Lifschitz, V.2
-
20
-
-
77951505493
-
Classical negation in logic programs and disjunctive databases
-
3/4
-
Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Gener. Comput. 9(3/4), 365-386 (1991)
-
(1991)
New Gener. Comput.
, vol.9
, pp. 365-386
-
-
Gelfond, M.1
Lifschitz, V.2
-
22
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
Proc. of iTrust'05 Springer Berlin
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modelling social and individual trust in requirements engineering methodologies. In: Proc. of iTrust'05. Lecture Notes in Computer Science, vol. 3477, pp. 161-176. Springer, Berlin (2005a)
-
(2005)
Lecture Notes in Computer Science
, vol.3477
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
23
-
-
84924413055
-
Security and trust requirements engineering
-
FOSAD 2004/2005 Springer Berlin
-
Giorgini, P., Massacci, F., Zannone, N.: Security and trust requirements engineering. In: FOSAD 2004/2005. Lecture Notes in Computer Science, vol. 3655, pp. 237-272. Springer, Berlin (2005b)
-
(2005)
Lecture Notes in Computer Science
, vol.3655
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
24
-
-
33749035450
-
Requirements engineering for trust management: Model, methodology, and reasoning
-
4
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inform. Sec. 5(4), 257-274 (2006)
-
(2006)
Int. J. Inform. Sec.
, vol.5
, pp. 257-274
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
25
-
-
0030109943
-
Executing formal specifications need not be harmful
-
2
-
Gravell, A.M., Henderson, P.: Executing formal specifications need not be harmful. IEE/BCS Softw. Eng. J. 11(2), 104-110 (1996)
-
(1996)
IEE/BCS Softw. Eng. J.
, vol.11
, pp. 104-110
-
-
Gravell, A.M.1
Henderson, P.2
-
26
-
-
34548557819
-
Arguing security: Validating security requirements using structured argumentation
-
Haley, C.B., Moffett, J., Laney, R., Nuseibeh, B.: Arguing security: validating security requirements using structured argumentation. In: Proc. of SREIS'05 (2005)
-
(2005)
Proc. of SREIS'05
-
-
Haley, C.B.1
Moffett, J.2
Laney, R.3
Nuseibeh, B.4
-
27
-
-
84863906471
-
SCR*: A toolset for specifying and analyzing software requirements
-
Springer Berlin
-
Heitmeyer, C.L., Kirby, J., Labaw, B.G., Bharadwaj, R.: SCR*: A toolset for specifying and analyzing software requirements. In: Proc. of CAV'98, pp. 526-531. Springer, Berlin (1998)
-
(1998)
Proc. of CAV'98
, pp. 526-531
-
-
Heitmeyer, C.L.1
Kirby, J.2
Labaw, B.G.3
Bharadwaj, R.4
-
28
-
-
34548584165
-
-
House of Lords, P.: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999). Available on
-
House of Lords, P.: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999). Available on www.parliament.the-stationeryoffice.co.uk
-
-
-
-
29
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
2
-
Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. 11(2), 256-290 (2002)
-
(2002)
ACM Trans. Softw. Eng. Methodol.
, vol.11
, pp. 256-290
-
-
Jackson, D.1
-
30
-
-
34548589350
-
V2: Using violation and vulnerability analysis to understand the root causes of complex security incidents
-
Submitted to
-
Johnson, C.W.: V2: using violation and vulnerability analysis to understand the root causes of complex security incidents. Submitted to ACM Trans. Inf. Syst. Secur. (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
-
-
Johnson, C.W.1
-
33
-
-
33745244351
-
The DLV system for knowledge representation and reasoning
-
3
-
Leone, N., Pfeifer, G., Faber, W., Eiter, T., Gottlob, G., Perri, S., Scarcello, F.: The DLV system for knowledge representation and reasoning. ACM Trans. Comput. Log. 7(3), 499-562 (2006)
-
(2006)
ACM Trans. Comput. Log.
, vol.7
, pp. 499-562
-
-
Leone, N.1
Pfeifer, G.2
Faber, W.3
Eiter, T.4
Gottlob, G.5
Perri, S.6
Scarcello, F.7
-
34
-
-
84879948745
-
Disjunctive answer set programming via satisfiability
-
Proc. of the 3rd Int. Workshop on Answer Set Prog.: Adv. in Theory and Implementation CEUR-WS. org
-
Lierler, Y.: Disjunctive answer set programming via satisfiability. In: Proc. of the 3rd Int. Workshop on Answer Set Prog.: Adv. in Theory and Implementation, CEUR Workshop Proceedings. CEUR-WS. org, vol. 142 (2005)
-
(2005)
CEUR Workshop Proceedings
, vol.142
-
-
Lierler, Y.1
-
35
-
-
0036923682
-
ASSAT: Computing answer sets of a logic program by SAT solvers
-
AAAI Press Menlo Park
-
Lin, F., Zhao, Y.: ASSAT: computing answer sets of a logic program by SAT solvers. In: Proc. of the 18th Nat. Conf. on Artif. Intell, pp. 112-117. AAAI Press, Menlo Park (2002)
-
(2002)
Proc. of the 18th Nat. Conf. on Artif. Intell
, pp. 112-117
-
-
Lin, F.1
Zhao, Y.2
-
36
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Press New York
-
Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proc. of RE'03, pp. 151-161. IEEE Press, New York (2003)
-
(2003)
Proc. of RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
37
-
-
84969387974
-
Exploiting reusable specifications through analogy
-
4
-
Maiden, N., Sutcliffe, A.: Exploiting reusable specifications through analogy. CACM 35(4), 55-64 (1992)
-
(1992)
CACM
, vol.35
, pp. 55-64
-
-
Maiden, N.1
Sutcliffe, A.2
-
38
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
5
-
Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput. Stand. Interfaces 27(5), 445-455 (2005)
-
(2005)
Comput. Stand. Interfaces
, vol.27
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
40
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
IEEE Press New York
-
McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proc. of ACSAC'99, pp. 55-66. IEEE Press, New York (1999)
-
(1999)
Proc. of ACSAC'99
, pp. 55-66
-
-
McDermott, J.1
Fox, C.2
-
42
-
-
0002103329
-
Efficient implementation of the well-founded and stable model semantics
-
MIT Press Cambridge
-
Niemelä, I., Simons, P.: Efficient implementation of the well-founded and stable model semantics. In: Proc. of JICSLP'96, pp. 289-303. MIT Press, Cambridge (1996)
-
(1996)
Proc. of JICSLP'96
, pp. 289-303
-
-
Niemelä, I.1
Simons, P.2
-
44
-
-
85023009798
-
Requirements engineering: A roadmap
-
ACM Press New York
-
Nuseibeh, B., Easterbrook, S.: Requirements engineering: a roadmap. In: Proc. of ICSE'00, pp. 35-46. ACM Press, New York (2000)
-
(2000)
Proc. of ICSE'00
, pp. 35-46
-
-
Nuseibeh, B.1
Easterbrook, S.2
-
45
-
-
34250014499
-
Modeling and reasoning for confidentiality requirements in software development
-
IEEE Press New York
-
Onabajo, A., Jahnke, J.H.: Modeling and reasoning for confidentiality requirements in software development. In: Proc. of ECBS'06, pp. 460-467. IEEE Press, New York (2006)
-
(2006)
Proc. of ECBS'06
, pp. 460-467
-
-
Onabajo, A.1
Jahnke, J.H.2
-
46
-
-
22944459190
-
Developing tools for agent-oriented visual modeling
-
Proc. of MATES'04 Springer Berlin
-
Perini, A., Susi, A.: Developing tools for agent-oriented visual modeling. In: Proc. of MATES'04. Lecture Notes in Computer Science, vol. 3187, pp. 169-182. Springer, Berlin (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.3187
, pp. 169-182
-
-
Perini, A.1
Susi, A.2
-
47
-
-
34548547506
-
-
Promontory Financial Group, Wachtell, Lipton, Rosen, Katz: Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses 2003
-
Promontory Financial Group, Wachtell, Lipton, Rosen, Katz: Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (2003)
-
-
-
-
48
-
-
34548582286
-
FAUST: Formal analysis using specification tools
-
IEEE Press New York
-
Rifaut, A., Massonet, P., Molderez, J.-F., Ponsard, C., Stadnik, P., van Lamsweerde, A., Hung, T.V.: FAUST: formal analysis using specification tools. In: Proc. of RE'03, p. 350. IEEE Press, New York (2003)
-
(2003)
Proc. of RE'03
, pp. 350
-
-
Rifaut, A.1
Massonet, P.2
Molderez, J.-F.3
Ponsard, C.4
Stadnik, P.5
Van Lamsweerde, A.6
Hung, T.V.7
-
49
-
-
0016555241
-
The protection of information in computer systems
-
9
-
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proc. IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
50
-
-
84881617712
-
Model-based development of embedded systems
-
Proc. of OOIS'02 Springer Berlin
-
Schätz, B., Pretschner, A., Huber, F., Philipps, J.: Model-based development of embedded systems. In: Proc. of OOIS'02. Lecture Notes in Computer Science, vol. 2426, pp. 298-312. Springer, Berlin (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2426
, pp. 298-312
-
-
Schätz, B.1
Pretschner, A.2
Huber, F.3
Philipps, J.4
-
53
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
1
-
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. J. 10(1), 34-44 (2005)
-
(2005)
Requir. Eng. J.
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
54
-
-
9444250310
-
-
NASA Washington
-
Stamatelatos, M., Vesely, W., Dugan, J., Fragola, J., Minarick, J., Railsback, J.: Fault Tree Handbook with Aerospace Applications. NASA, Washington (2002)
-
(2002)
Fault Tree Handbook with Aerospace Applications
-
-
Stamatelatos, M.1
Vesely, W.2
Dugan, J.3
Fragola, J.4
Minarick, J.5
Railsback, J.6
-
55
-
-
34548586060
-
-
United States of America v. John M. Rusnak. SMS/SD/USAO #2002R02005
-
US Department of Justice: United States of America v. John M. Rusnak. SMS/SD/USAO #2002R02005. (2002). http://www.usdoj.gov/dag/cftf/chargingdocs/ allfirst.pdf
-
(2002)
-
-
-
56
-
-
0042266501
-
The alternating fixpoint of logic programs with negation
-
ACM Press New York
-
van Gelder, A.: The alternating fixpoint of logic programs with negation. In: Proc. of PODS'89, pp. 1-10. ACM Press, New York (1989)
-
(1989)
Proc. of PODS'89
, pp. 1-10
-
-
Van Gelder, A.1
-
57
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
IEEE Press New York
-
van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proc. of ICSE'04, pp. 148-157. IEEE Press, New York (2004)
-
(2004)
Proc. of ICSE'04
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
58
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
10
-
van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26(10), 978-1005 (2000)
-
(2000)
IEEE Trans. Softw. Eng.
, vol.26
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
|