-
4
-
-
84982899264
-
The Role of Trust Management in Distributed Systems Security
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The Role of Trust Management in Distributed Systems Security. Secure Internet Programming, 1603:185-210, 1999.
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
6
-
-
3142750497
-
TROPOS: An Agent-Oriented Software Development Methodology
-
P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, and A. Perini. TROPOS: An Agent-Oriented Software Development Methodology. JAAMAS, 8(3):203-236, 2004.
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
7
-
-
0001470602
-
REFEREE: Trust management for Web applications
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems, 29(8-13):953-964, 1997.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
9
-
-
84880846309
-
Aggregate Functions in Disjunctive Logic Programming: Semantics, Complexity, and Implementation in DLV
-
Morgan Kaufmann Publishers
-
T. Dell' Armi, W. Faber, G. Ielpa, N. Leone, and G. Pfeifer. Aggregate Functions in Disjunctive Logic Programming: Semantics, Complexity, and Implementation in DLV. In Proc. of IJCAI'03. Morgan Kaufmann Publishers, 2003.
-
(2003)
Proc. of IJCAI'03
-
-
Dell'Armi, T.1
Faber, W.2
Ielpa, G.3
Leone, N.4
Pfeifer, G.5
-
10
-
-
0003546303
-
-
Internet Draft (work in progress)
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. Simple Public Key Certificates. Internet Draft (work in progress), 1999.
-
(1999)
Simple Public Key Certificates
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
11
-
-
84942927004
-
Specifying and analyzing early requirements: Some experimental results
-
IEEE Press
-
A. Fuxman, L. Liu, M. Pistore, M. Roveri, and J. Mylopoulos. Specifying and analyzing early requirements: Some experimental results. In Proc. of RE'03, page 105. IEEE Press, 2003.
-
(2003)
Proc. of RE'03
, pp. 105
-
-
Fuxman, A.1
Liu, L.2
Pistore, M.3
Roveri, M.4
Mylopoulos, J.5
-
12
-
-
35048841167
-
Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning
-
Proc. of iTrust 2004, Springer-Verlag Heidelberg
-
P. Giorgini, F. Massacci, J. Mylopoulous, and N. Zannone. Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning. In Proc. of iTrust 2004, volume 2995 of LNCS, pages 176-190. Springer-Verlag Heidelberg, 2004.
-
(2004)
LNCS
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulous, J.3
Zannone, N.4
-
13
-
-
0034497420
-
Eliciting Security Requirements by Misuse Cases
-
S. Guttorm. Eliciting Security Requirements by Misuse Cases. In Proc. of TOOLS Pacific 2000, 2000.
-
(2000)
Proc. of TOOLS Pacific 2000
-
-
Guttorm, S.1
-
14
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Press
-
T. Jim. SD3: a trust management system with certified evaluation. In Proc. of 2001 IEEE Symp. on Sec. and Privacy, pages 106 -115. IEEE Press, 2001.
-
(2001)
Proc. of 2001 IEEE Symp. on Sec. and Privacy
, pp. 106-115
-
-
Jim, T.1
-
15
-
-
35048887445
-
Towards Secure Systems Development with UMLsec
-
J. Jürjens. Towards Secure Systems Development with UMLsec. In Proc. of FASE'01, 2001.
-
(2001)
Proc. of FASE'01
-
-
Jürjens, J.1
-
16
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. TISSEC, 6(1):128-171, 2003.
-
(2003)
TISSEC
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
17
-
-
0037974359
-
Datalog with Constraints: A Foundation for Trust-management Languages
-
N. Li and J. C. Mitchell. Datalog with Constraints: A Foundation for Trust-management Languages. In Proc.of PADL'03, 2003.
-
(2003)
Proc.of PADL'03
-
-
Li, N.1
Mitchell, J.C.2
-
19
-
-
0037243196
-
Distributed Credential Chain Discovery in Trust Management
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed Credential Chain Discovery in Trust Management. J. of Comp. Sec., 11(1):35-86, 2003.
-
(2003)
J. of Comp. Sec.
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
20
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
L. Liu, E. S. K. Yu, and J. Mylopoulos. Security and Privacy Requirements Analysis within a Social Setting. In Proc. of RE'03, pages 151-161, 2003.
-
(2003)
Proc. of RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
21
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
J.-M. Jezequel, H. Hussmann, and S. Cook, editors, Springer-Verlag Heidelberg
-
T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In J.-M. Jezequel, H. Hussmann, and S. Cook, editors, Proc. of UML'02, volume 2460, pages 426-441. Springer-Verlag Heidelberg, 2002.
-
(2002)
Proc. of UML'02
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
22
-
-
35048858244
-
PKI design based on the use of on-line certification authorities
-
J. Lopez, A. Mana, J. A. Montenegro, and J. J. Ortega. PKI design based on the use of on-line certification authorities. Int. J. of Information Sec., 2(2):91 - 102, 2004.
-
(2004)
Int. J. of Information Sec.
, vol.2
, Issue.2
, pp. 91-102
-
-
Lopez, J.1
Mana, A.2
Montenegro, J.A.3
Ortega, J.J.4
-
23
-
-
85045573601
-
Using Abuse Care Models for Security Requirements Analysis
-
J. McDermott and C. Fox. Using Abuse Care Models for Security Requirements Analysis. In Proc. of ACSAC'99, 1999.
-
(1999)
Proc. of ACSAC'99
-
-
McDermott, J.1
Fox, C.2
-
26
-
-
0035780469
-
Embedding security practices in contemporary information systems development approaches
-
T. Tryfonas, E. Kiountouzis, and A. Poulymenakou. Embedding security practices in contemporary information systems development approaches. Inform. Management and Comp. Sec., 9:183-197, 2001.
-
(2001)
Inform. Management and Comp. Sec.
, vol.9
, pp. 183-197
-
-
Tryfonas, T.1
Kiountouzis, E.2
Poulymenakou, A.3
|