메뉴 건너뛰기




Volumn 3093, Issue , 2004, Pages 98-111

Filling the gap between requirements engineering and public key/trust management infrastructures

Author keywords

Modelling and Architecture; PKI and eHealth applications; PKI Requirements Analysis; Privilege Management; Security Engineering; Trust; Verification

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; TELECOMMUNICATION NETWORKS; VERIFICATION;

EID: 35048857793     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25980-0_8     Document Type: Article
Times cited : (14)

References (26)
  • 9
    • 84880846309 scopus 로고    scopus 로고
    • Aggregate Functions in Disjunctive Logic Programming: Semantics, Complexity, and Implementation in DLV
    • Morgan Kaufmann Publishers
    • T. Dell' Armi, W. Faber, G. Ielpa, N. Leone, and G. Pfeifer. Aggregate Functions in Disjunctive Logic Programming: Semantics, Complexity, and Implementation in DLV. In Proc. of IJCAI'03. Morgan Kaufmann Publishers, 2003.
    • (2003) Proc. of IJCAI'03
    • Dell'Armi, T.1    Faber, W.2    Ielpa, G.3    Leone, N.4    Pfeifer, G.5
  • 11
    • 84942927004 scopus 로고    scopus 로고
    • Specifying and analyzing early requirements: Some experimental results
    • IEEE Press
    • A. Fuxman, L. Liu, M. Pistore, M. Roveri, and J. Mylopoulos. Specifying and analyzing early requirements: Some experimental results. In Proc. of RE'03, page 105. IEEE Press, 2003.
    • (2003) Proc. of RE'03 , pp. 105
    • Fuxman, A.1    Liu, L.2    Pistore, M.3    Roveri, M.4    Mylopoulos, J.5
  • 12
    • 35048841167 scopus 로고    scopus 로고
    • Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning
    • Proc. of iTrust 2004, Springer-Verlag Heidelberg
    • P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning. In Proc. of iTrust 2004, volume 2995 of LNCS, pages 176-190. Springer-Verlag Heidelberg, 2004.
    • (2004) LNCS , vol.2995 , pp. 176-190
    • Giorgini, P.1    Massacci, F.2    Mylopoulous, J.3    Zannone, N.4
  • 13
    • 0034497420 scopus 로고    scopus 로고
    • Eliciting Security Requirements by Misuse Cases
    • S. Guttorm. Eliciting Security Requirements by Misuse Cases. In Proc. of TOOLS Pacific 2000, 2000.
    • (2000) Proc. of TOOLS Pacific 2000
    • Guttorm, S.1
  • 14
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Press
    • T. Jim. SD3: a trust management system with certified evaluation. In Proc. of 2001 IEEE Symp. on Sec. and Privacy, pages 106 -115. IEEE Press, 2001.
    • (2001) Proc. of 2001 IEEE Symp. on Sec. and Privacy , pp. 106-115
    • Jim, T.1
  • 15
    • 35048887445 scopus 로고    scopus 로고
    • Towards Secure Systems Development with UMLsec
    • J. Jürjens. Towards Secure Systems Development with UMLsec. In Proc. of FASE'01, 2001.
    • (2001) Proc. of FASE'01
    • Jürjens, J.1
  • 16
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. TISSEC, 6(1):128-171, 2003.
    • (2003) TISSEC , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 17
    • 0037974359 scopus 로고    scopus 로고
    • Datalog with Constraints: A Foundation for Trust-management Languages
    • N. Li and J. C. Mitchell. Datalog with Constraints: A Foundation for Trust-management Languages. In Proc.of PADL'03, 2003.
    • (2003) Proc.of PADL'03
    • Li, N.1    Mitchell, J.C.2
  • 19
    • 0037243196 scopus 로고    scopus 로고
    • Distributed Credential Chain Discovery in Trust Management
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed Credential Chain Discovery in Trust Management. J. of Comp. Sec., 11(1):35-86, 2003.
    • (2003) J. of Comp. Sec. , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 20
    • 84942866002 scopus 로고    scopus 로고
    • Security and Privacy Requirements Analysis within a Social Setting
    • L. Liu, E. S. K. Yu, and J. Mylopoulos. Security and Privacy Requirements Analysis within a Social Setting. In Proc. of RE'03, pages 151-161, 2003.
    • (2003) Proc. of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 21
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-Based Modeling Language for Model-Driven Security
    • J.-M. Jezequel, H. Hussmann, and S. Cook, editors, Springer-Verlag Heidelberg
    • T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In J.-M. Jezequel, H. Hussmann, and S. Cook, editors, Proc. of UML'02, volume 2460, pages 426-441. Springer-Verlag Heidelberg, 2002.
    • (2002) Proc. of UML'02 , vol.2460 , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 22
  • 23
    • 85045573601 scopus 로고    scopus 로고
    • Using Abuse Care Models for Security Requirements Analysis
    • J. McDermott and C. Fox. Using Abuse Care Models for Security Requirements Analysis. In Proc. of ACSAC'99, 1999.
    • (1999) Proc. of ACSAC'99
    • McDermott, J.1    Fox, C.2
  • 26
    • 0035780469 scopus 로고    scopus 로고
    • Embedding security practices in contemporary information systems development approaches
    • T. Tryfonas, E. Kiountouzis, and A. Poulymenakou. Embedding security practices in contemporary information systems development approaches. Inform. Management and Comp. Sec., 9:183-197, 2001.
    • (2001) Inform. Management and Comp. Sec. , vol.9 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.