-
1
-
-
35248866863
-
-
http://www.casenet-eu.org.
-
-
-
-
4
-
-
25744459226
-
-
Technical Report B-01-06, Institut für Informatik, Freie Universität Berlin, November
-
Gerald Brose, Manuel Koch, and Klaus-Peter Löhr. Integrating security policy design into the software development process. Technical Report B-01-06, Institut für Informatik, Freie Universität Berlin, November 2001.
-
(2001)
Integrating Security Policy Design into the Software Development Process
-
-
Brose, G.1
Koch, M.2
Löhr, K.-P.3
-
6
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
234-??
-
L. Chung. Dealing with security requirements during the development of information systems. Lecture Notes in Computer Science, 685:234-??, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.685
-
-
Chung, L.1
-
7
-
-
0026924915
-
Object-oriented patterns
-
September
-
P. Coad. Object-oriented patterns. Communications of the ACM, 35(9):153-159, September 1993.
-
(1993)
Communications of the ACM
, vol.35
, Issue.9
, pp. 153-159
-
-
Coad, P.1
-
14
-
-
37149024045
-
Design patterns: Abstraction and reuse of object-oriented design
-
Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design patterns: Abstraction and reuse of object-oriented design. Lecture Notes in Computer Science, 707:406-431, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.707
, pp. 406-431
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
15
-
-
0004189634
-
-
Addison Wesley, Reading, Mass.
-
Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. Design Patterns. Addison Wesley, Reading, Mass., 1995.
-
(1995)
Design Patterns
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
16
-
-
0342520920
-
ConGolog, a concurrent programming language based on situation calculus
-
Giuseppe De Giacomo, Yves Lésperance, and Hector J. Levesque. ConGolog, A concurrent programming language based on situation calculus. Artificial Intelligence, 121(1-2):109-169, 2000.
-
(2000)
Artificial Intelligence
, vol.121
, Issue.1-2
, pp. 109-169
-
-
De Giacomo, G.1
Lésperance, Y.2
Levesque, H.J.3
-
17
-
-
35248828979
-
Especificación formal de protocolos criptográficos en cálculo de situaciones
-
J. Hernández and J. Pinto. Especificación formal de protocolos criptográficos en cálculo de situaciones. Novatica, 143:57-63, 2000.
-
(2000)
Novatica
, vol.143
, pp. 57-63
-
-
Hernández, J.1
Pinto, J.2
-
19
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
Jan Jürjens. Towards development of secure systems using UMLsec. Lecture Notes in Computer Science, 2029, 2001.
-
(2001)
Lecture Notes in Computer Science
, pp. 2029
-
-
Jürjens, J.1
-
20
-
-
0036643491
-
A formal framework for business process modeling and design
-
M. Koubarakis and D. Plexousakis. A formal framework for business process modeling and design. Information Systems, 27(5):299-319, 2002.
-
(2002)
Information Systems
, vol.27
, Issue.5
, pp. 299-319
-
-
Koubarakis, M.1
Plexousakis, D.2
-
21
-
-
0003229541
-
A situation calculus approach to modeling and programming agents
-
Michael J. Wooldridge and A. Rao, editors, Kluwer Academic Publishers, Dordrecht
-
Yves Lespérance, Hector J. Levesque, and Raymond Reiter. A situation calculus approach to modeling and programming agents. In Michael J. Wooldridge and A. Rao, editors, Foundations of Rational Agency, pages 275-299. Kluwer Academic Publishers, Dordrecht, 1999.
-
(1999)
Foundations of Rational Agency
, pp. 275-299
-
-
Lespérance, Y.1
Levesque, H.J.2
Reiter, R.3
-
22
-
-
0014638440
-
Some philosophical problems from the standpoint of artificial intelligence
-
J. McCarthy and P. J. Hayes. Some philosophical problems from the standpoint of artificial intelligence. Machine Intelligence, 4:463-502, 1969.
-
(1969)
Machine Intelligence
, vol.4
, pp. 463-502
-
-
McCarthy, J.1
Hayes, P.J.2
-
24
-
-
0026883734
-
Representing and using nonfunctional requirements: A process-oriented approach
-
June Knowledge Representation and Reasoning in Software Engineering
-
John Mylopoulos, Lawrence Chung, and Brian Nixon. Representing and using nonfunctional requirements: A process-oriented approach. IEEE Transactions on Software Engineering, 18(6):483-497, June 1992. Special Issue on Knowledge Representation and Reasoning in Software Engineering.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, Issue.6 SPEC. ISSUE
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
25
-
-
84942786976
-
A language for modelling secure business transactions
-
Phoenix, USA, December
-
Alexander W. Röhm, Gaby Herrmann, and Günther Pernul. A language for modelling secure business transactions. In IEEE Annual Computer Security Application Conference (ACSAC'99), Phoenix, USA, December 1999.
-
(1999)
IEEE Annual Computer Security Application Conference (ACSAC'99)
-
-
Röhm, A.W.1
Herrmann, G.2
Pernul, G.3
-
27
-
-
0013447892
-
The situation calculus with sensing and indexical knowledge
-
Moshe Koppel and Eli Shamir, editors, Israel, Ramat Gan and Jerusalem
-
R. Scherl, H. Levesque, and Y. Lesprance. The situation calculus with sensing and indexical knowledge. In Moshe Koppel and Eli Shamir, editors, Proceedings of BISFAI'95: The Fourth Bar-Ilan Symposium on Foundations of Artificial Intelligence, pages 86-95, Israel, 1995. Ramat Gan and Jerusalem.
-
(1995)
Proceedings of BISFAI'95: The Fourth Bar-Ilan Symposium on Foundations of Artificial Intelligence
, pp. 86-95
-
-
Scherl, R.1
Levesque, H.2
Lesprance, Y.3
-
28
-
-
0027704415
-
The frame problem and knowledge-producing actions
-
Richard Fikes and Wendy Lehnert, editors, Menlo Park, California, American Association for Artificial Intelligence, AAAI Press
-
Richard B. Scherl and Hector J. Levesque. The frame problem and knowledge-producing actions. In Richard Fikes and Wendy Lehnert, editors, Proceedings of the Eleventh National Conference on Artificial Intelligence, pages 698-695, Menlo Park, California, 1993. American Association for Artificial Intelligence, AAAI Press.
-
(1993)
Proceedings of the Eleventh National Conference on Artificial Intelligence
, pp. 698-1695
-
-
Scherl, R.B.1
Levesque, H.J.2
-
29
-
-
0003487308
-
-
John Wiley and Sons, Inc., New York, NY, USA
-
Bruce Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons, Inc., New York, NY, USA, 2000.
-
(2000)
Secrets and Lies: Digital Security in a Networked World
-
-
Schneier, B.1
-
31
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
November
-
Guttorm Sindre and Andreas L. Opdahl. Eliciting security requirements by misuse cases. In Proc. TOOLS Pacific 2000, pages 174-183, November 2000.
-
(2000)
Proc. TOOLS Pacific 2000
, pp. 174-183
-
-
Sindre, G.1
Opdahl, A.L.2
-
33
-
-
84904255922
-
A new paradigm for adding security into is development methods
-
Jan H.P. Eloff, Les Labuschagne, Rossouw von Solms, and Gurpreet Dhillon, editors, Kluwer Academic Publishers
-
Mikko Siponen and Richard Baskerville. A new paradigm for adding security into is development methods. In Jan H.P. Eloff, Les Labuschagne, Rossouw von Solms, and Gurpreet Dhillon, editors, Advances in Information Security Management & Small Systems Security, pages 99-111. Kluwer Academic Publishers, 2001.
-
(2001)
Advances in Information Security Management & Small Systems Security
, pp. 99-111
-
-
Siponen, M.1
Baskerville, R.2
-
34
-
-
35248840413
-
An empiricakl study of industrial security engineering practices
-
November
-
R. Vaugh, R. Henning, and K. Fox. An empiricakl study of industrial security engineering practices. Journal of Systems and Software, November 2001.
-
(2001)
Journal of Systems and Software
-
-
Vaugh, R.1
Henning, R.2
Fox, K.3
|